Re: HEADS UP: dhcp will ship bunded bind libraries

2019-03-12 Thread Tomas Hozza
On 10. 3. 2019 19:59, Tomasz Kłoczko wrote:
> On Thu, 28 Feb 2019 at 14:11, Neal Gompa  wrote:
> [..]
>>> tl;dr dhcp 4.4.1 will not require bind-export-libs and will bring 
>>> dhcp-libs-static with bundled version of libisc/libdns/etc
>>>
>>> As ISC dropped support of single thread build of BIND libraries [1] and 
>>> dhcp requires one we decided to not patch dhcp/bind build scripts anymore 
>>> and ship bundled bind libraries just like upstream (ISC) does it. It will 
>>> allow to update BIND in Fedora to newest version. So dhcp 4.4.1 can be 
>>> expected in rawhide/F31 soon!
>>> I'm aware of FPG recommendation to avoid shipping of bundled libraries due 
>>> to its maintenance cost but maintaining of heavy patched build sctipts and 
>>> inability to ship newer versions are even worse.
>>>
>>> I have not find any application in Fedora repository which link with 
>>> libdhcp/libomapi. Please let me know if you aware of any.
>>>
>> Just add the bundled() Provides if it's building with bundled copies,
>> per the policy:
>> https://docs.fedoraproject.org/en-US/packaging-guidelines/#bundling
> 
> I'm only curious (maybe I do not understand something about this
> issue) .. why dhcpd cannot use standard glibc resolver?
> IIRC glibc libresolve is thread safe (if this issue it is about thread
> safe DNS resolution).
> Can someone explain that topic a bit?
> 
> kloczek
> 

ISC DHCP uses BIND libraries e.g. to support Dynamic DNS updates on 
authoritative DNS server when assigning leases to hosts. I don't think that 
glibc resolver would be anyhow useful in this case.

Regards,
Tomas
-- 
Tomas Hozza
Associate Manager, Software Engineering - EMEA ENG Core Services

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Orphaned python-adns

2018-12-06 Thread Tomas Hozza
Hi all.

I just orphaned python-adns. I don't need it and don't plan to maintain it. The 
last upstream release was in 2007 and it does not support Python3. Also it 
FTBFS in rawhide.

python-adns is required by transmission-remote-cli. Please consider removing 
the dependency, so that python-adns can be retired or please consider 
maintaining python-adns as well.

Regards,
Tomas
-- 
Tomas Hozza
Associate Manager, Software Engineering - EMEA ENG Core Services

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org


Re: F26 Self Contained Change: BIND version 9.11

2016-10-11 Thread Tomas Hozza

On 10/09/2016 09:58 PM, Peter Robinson wrote:
> On Mon, Oct 3, 2016 at 11:18 AM, Jan Kurik <jku...@redhat.com> wrote:
> > = Proposed Self Contained Change: BIND version 9.11 =
> > https://fedoraproject.org/wiki/Changes/BIND_9.11
> >
> > Change owner(s):
> > * Tomas Hozza 
> > * Michal Ruprich 
> >
> > BIND (Berkeley Internet Name Domain) version 9.11 is the latest stable
> > major update of the widely used DNS server. Besides new features, some
> > settings defaults have changed since the previous major version
> > (9.10).
> >
> > == Detailed Description ==
> > FULL BIND 9.11 RELEASE NOTES:
> > ftp://ftp.isc.org/isc/bind9/9.11.0b3/RELEASE-NOTES-bind-9.11.0b3.txt
> >
> > New features
> > * A new method of provisioning secondary servers called "Catalog
> > Zones" has been added.
> > * Added an isc.rndc Python module, which allows rndc commands to be
> > sent from Python programs.
> > * Added support for DynDB, a new interface for loading zone data from
> > an external database, developed by Red Hat for the FreeIPA project.
> > * New quotas have been added to limit the queries that are sent by
> > recursive resolvers to authoritative servers experiencing
> > denial-of-service attacks.
> > * Added support for dnstap, a fast, flexible method for capturing and
> > logging DNS traffic.
> > * A new DNSSEC key management utility, dnssec-keymgr, has been added.
> > * nslookup will now look up IPv6 as well as IPv4 addresses by default.
> > * named will now check to see whether other name server processes are
> > running before starting up.
> > * Added server-side support for pipelined TCP queries.
> > * The new mdig command is a version of dig that sends multiple
> > pipelined queries and then waits for responses, instead of sending one
> > query and waiting the response before sending the next.
> > * A new message-compression option can be used to specify whether or
> > not to use name compression when answering queries.
> > * When loading a signed zone, named will now check whether an RRSIG's
> > inception time is in the future, and if so, it will regenerate the
> > RRSIG immediately.
> >
> > Feature changes
> > * When using native PKCS#11 cryptography (i.e., configure
> > --enable-native-pkcs11) HSM PINs of up to 256 characters can now be
> > used.
> > * Update forwarding performance has been improved by allowing a single
> > TCP connection to be shared between multiple updates.
> > * Added support for OPENPGPKEY type.
> > * Retrieving the local port range from net.ipv4.ip_local_port_range on
> > Linux is now supported.
> > * On machines with 2 or more processors (CPU), the default value for
> > the number of UDP listeners has been changed to the number of detected
> > processors minus one.
> > * Zone transfers now use smaller message sizes to improve message
> > compression. This results in reduced network usage.
> > * Added support for the AVC resource record type (Application
> > Visibility and Control).
> >
> > == Scope ==
> > Proposal owners:
> > * Rebase the package to the latest 9.11 minor version and resolve
> > possible packaging issues. (Also rebuild all currently existing
> > dependent packages listed below)
>
> Any idea if we can move back to building the dhcp package against the
> latest version and retire bind99? I don't remember the exact bugs we
> saw against 9.10 with dhcp (although I do vaguely remember some issue
> that forced the change).
> ___
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>

Hello Peter.

ISC DHCP can be built only against BIND libraries from major version 9.9.x. In 
9.9.x version they built separate "external" version of libraries, which are 
used by DHCP. In newer BIND versions they are building only a single version of 
libraries (in which they removed bunch of #IFDEFs), but unfortunately these 
libraries are not usable for building DHCP at this moment. ISC has other 
priorities at this point, as they bundle BIND sources with DHCP tarball and 
BIND of version 9.9.x is supported until end of 2017.

So short answer is NO, we can not retire bind99 because it is not possible to 
build DHCP against BIND 9.10.x nor 9.11.x.

Nevertheless bind99 is a stripped down version in which only the necessary 
libraries are built, without building BIND itself or any other BIND utility. So 
technically we have only a single version of BIND in the distribution.

Short story long (the FPC ticket which granted the exception for bind99) -> 
https://fedorahosted.org/fpc/ticket/502

Regards,
Tomas
-- 
Tomas Hozza
Associate Manager, Software Engineering - EMEA ENG Mainstream RHEL

PGP: 1D9F3C2D
UTC+2 (CEST)
Red Hat Inc. http://cz.redhat.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Bind update (CVE-2016-2776)?

2016-09-29 Thread Tomas Hozza

On 09/29/2016 10:36 AM, Igor Gnatenko wrote:
> On Thu, Sep 29, 2016 at 10:08 AM, Tomas Hozza <tho...@redhat.com> wrote:
> > On 09/29/2016 06:19 AM, Bojan Smojver wrote:
> >> Could someone with sufficient access please spin up an update of bind
> >> for F-24 and other flavours of Fedora. That CVE looks like a pretty
> >> serious DoS. This has already been fixed in RHEL.
> >>
> >> Thanks,
> >>
> >
> > Hi.
> >
> > I'll be pushing the updates shortly. The problem with Fedora is that we can 
> > not prepare the update in advance as for RHEL, because everything (git 
> > repos, update system, etc.) is public.
> You mean before CVE has been published? Or what's the problem with being 
> public?

Yes, that's what I meant.

Tomas

> >
> > Regards,
> > Tomas
> > --
> > Tomas Hozza
> > Associate Manager, Software Engineering - EMEA ENG Mainstream RHEL
> >
> > PGP: 1D9F3C2D
> > UTC+2 (CEST)
> > Red Hat Inc. http://cz.redhat.com
> > ___
> > devel mailing list -- devel@lists.fedoraproject.org
> > To unsubscribe send an email to devel-le...@lists.fedoraproject.org
>
>
>



-- 
Tomas Hozza
Associate Manager, Software Engineering - EMEA ENG Mainstream RHEL

PGP: 1D9F3C2D
UTC+2 (CEST)
Red Hat Inc. http://cz.redhat.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: Bind update (CVE-2016-2776)?

2016-09-29 Thread Tomas Hozza
On 09/29/2016 06:19 AM, Bojan Smojver wrote:
> Could someone with sufficient access please spin up an update of bind
> for F-24 and other flavours of Fedora. That CVE looks like a pretty
> serious DoS. This has already been fixed in RHEL.
>
> Thanks,
>

Hi.

I'll be pushing the updates shortly. The problem with Fedora is that we can not 
prepare the update in advance as for RHEL, because everything (git repos, 
update system, etc.) is public.

Regards,
Tomas
-- 
Tomas Hozza
Associate Manager, Software Engineering - EMEA ENG Mainstream RHEL

PGP: 1D9F3C2D
UTC+2 (CEST)
Red Hat Inc. http://cz.redhat.com
___
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org


Re: How to fix broken dependency in orphaned package that FTBFS in F24

2016-04-11 Thread Tomas Hozza


On 07.04.2016 15:50, James Hogarth wrote:
> 
> 
> On 7 April 2016 at 14:26, Tomas Hozza <tho...@redhat.com 
> <mailto:tho...@redhat.com>> wrote:
> 
> Hi all.
> 
> We pushed an update for log4cplus in F24+ [1]. It is a rebase and one of 
> the dependent packages is "pion-net". The problem is that pion-net does not 
> build on F24+, which stops us from pushing update on F24 which would not 
> break dependencies. There is an older build of pion-net in F24 from times 
> when it was building just fine.
> 
> What should be the process here? Should we untag the package from F24 or 
> should I ignore the broken dependency? I don't see any good solutions to this 
> problem other than fixing the FTBFS in pion-net.
> 
> Also note that pion-net is orphaned.
> 
> 
> 
> Well if you need it leaving it orphaned isn't going to help you (plus when it 
> gets retired your package will no longer meet its dependency requirements so 
> will need to be retired without the dep picked up).
> 
> So as I see it options are:
> 1) Pick up pion-net yourself
> 2) Convince someone else to pick up pion-net
> 
> Either way the FTBFS will need to be fixed ... unless you retire log4cplus 
> from F24+ ... although I'm guessing you don't want to do that.
> 
> 
> 
> 
> --
> devel mailing list
> devel@lists.fedoraproject.org
> http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
> 

Actually it is the other way around. The orphaned package pion-net depends on 
log4cplus. I'm not interested in taking ownership of the pion-net and actually 
retiring if from F24 works for me.

log4cplus works as expected and is not broken, nor any of its dependencies. 
Only the one package which depends ON log4cplus. 

Regards,
-- 
Tomas Hozza
Senior Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


How to fix broken dependency in orphaned package that FTBFS in F24

2016-04-07 Thread Tomas Hozza
Hi all.

We pushed an update for log4cplus in F24+ [1]. It is a rebase and one of the 
dependent packages is "pion-net". The problem is that pion-net does not build 
on F24+, which stops us from pushing update on F24 which would not break 
dependencies. There is an older build of pion-net in F24 from times when it was 
building just fine.

What should be the process here? Should we untag the package from F24 or should 
I ignore the broken dependency? I don't see any good solutions to this problem 
other than fixing the FTBFS in pion-net.

Also note that pion-net is orphaned.

[1] https://bodhi.fedoraproject.org/updates/FEDORA-2016-53b6df64eb

Regards,
-- 
Tomas Hozza
Senior Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-07 Thread Tomas Hozza
On 07.12.2015 12:23, Lennart Poettering wrote:
> On Mon, 07.12.15 10:48, Tomas Hozza (tho...@redhat.com) wrote:
> 
>> On 04.12.2015 15:57, Lennart Poettering wrote:
>>> On Tue, 01.12.15 11:15, Tomas Hozza (tho...@redhat.com) wrote:
>>>
>>>> You are not mistaken.
>>>>
>>>> This is the third time, because previously we rather moved the change to 
>>>> the
>>>> next Fedora to bring better user experience. Every time there was something
>>>> enhanced, since we learned a lot about user use-cases, so this is 
>>>> definitely
>>>> not the same change as before, only the root idea is the same. The Change 
>>>> Wiki
>>>> is up-to-date and contains the current information.
>>>>
>>>> Also with many projects involved - Gnome Shell, NetworkManager, Unbound,
>>>> dnssec-trigger, SELinux (always a pleasure:), Docker... it is not the 
>>>> easiest
>>>> thing to agree on changes and coordinate everything on time.
>>>
>>> So, here's a question: in germany "Fritzbox" wifi routers are very
>>> popular. Their configuration page is reachable under the "fritz.box"
>>> pseudo-domain from inside their wifi network, and all other systems on
>>> the network are also eachable below this domain under their
>>> DHCP-configured hostnames. It implements a DNS proxy otherwise, only
>>> synthesizing A/ RRs for *.box. Now, one can certainly argue that
>>> this is borked, since the manufacturer doesn't own the ".box" domain,
>>> but discussing this is pretty pointless, as the fact that this is what
>>> is deployed in probably half of the homes in Germany... Also I am
>>> pretty sure other routers form other manufacturers do the same
>>> thing. Now, if we default to DNSSEC validation soon, does this mean
>>> people won't be able to configure their wifi routers anymore, or reach
>>> other systems on their home networks anymore, because the NSEC/NSEC3
>>> RRs in the root domain claim .box does not exist?  What's your
>>> strategy there?  Why do you think DNSSEC is worth breaking pretty much
>>> everybody's network? Note that Fritzbox is not a random crappy router,
>>> it's probably of the better products you can find.
>>
>> As you've said, this is basically an attack and hijacking of someone's
>> else domain name space. It is not correct and it is not expected that
>> this will work with DNSSEC.
> 
> Humm, I find that way too cavalier... I am pretty sure this is a total
> deal breaker for your feature. You cannot just break everybody's
> network and not consider that a problem that *you* have to think about
> rather than just ignoring it completely.

It sounds like you stopped at the first section of the email and ended there.
I didn't said that, and if you read the whole email you should understand that.
Otherwise my email would end right after this section you commented to.

> The ".box" domain is not owned by anyone, at least currently, it's
> certainly not "hijacking" of anybody else's domain name space.

You hijack the root zone space.

> But it really doesn't matter whether that's hijacking or not. What
> matters is that a large number of setups are like that... And you
> break them by default, and apparently don't consider this a problem.

I didn't said that.

> Quite frankly: a setup like this one isn't just very typical for home
> router networks, but also in many companies, where ".lan" or
> ".companyname" or something like that is frequently established in the
> internal network. And you will make Fedora incompatible with all these
> networks by default.
> 
> The way you proposed your feature this has no place at all on the
> desktop I am sure, where systems migrate between networks all the
> time, and sometimes quite shitty networks. I am very sure that most
> Fedora users would prefer their internet to work, rather than be
> "pretend-safe", after all DNSSEC is neither necessary for safe
> connections nor enables otherwise unsafe connections to be suddenly
> safe... 
> 
> Your feature has no place on the server the way it is either,
> because those are often enough located in some company network with
> internal DNS zones.

Lennart, you don't have to comment on something you think I said, while
the rest of my email described the possible solution to the problem.
This means that I think it is important to take it into account and
provide some possible solution.

>> I think we could extend the module with an option to configure list of 
>> domains
>> for 

Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-07 Thread Tomas Hozza

On 07.12.2015 14:52, Matthew Miller wrote:
> On Mon, Dec 07, 2015 at 12:23:34PM +0100, Lennart Poettering wrote:
> >> As you've said, this is basically an attack and hijacking of someone's
> >> else domain name space. It is not correct and it is not expected that
> >> this will work with DNSSEC.
> > Humm, I find that way too cavalier... I am pretty sure this is a total
> > deal breaker for your feature. You cannot just break everybody's
> > network and not consider that a problem that *you* have to think about
> > rather than just ignoring it completely.
>
> I agree with Lennart. Whether or not this is expected to work with
> DNSSEC is of academic interest given that people will expect it to work
> with _their computers_, regardless of what they're running.

I guess next time I'll not send thing to devel list that I don't want
to be picked on. This is completely out of context.

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-07 Thread Tomas Hozza
On 07.12.2015 15:15, Richard Hughes wrote:
> On 7 December 2015 at 14:04, Tomas Hozza <tho...@redhat.com> wrote:
>> I took this conversation as a mean for improvement.
> 
> When an email is titled "F24 System Wide Change" I think a lot of
> people (like me) were under the impression you wanted this to be a new
> feature in Fedora 24.

When I reply to an email that was a reply to my previous email, I take it
as a discussion. Sorry for confusing you.

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-07 Thread Tomas Hozza
On 07.12.2015 15:00, Matthew Miller wrote:
> On Mon, Dec 07, 2015 at 02:59:18PM +0100, Tomas Hozza wrote:
> >> I agree with Lennart. Whether or not this is expected to work with
> >> DNSSEC is of academic interest given that people will expect it to work
> >> with _their computers_, regardless of what they're running.
> > I guess next time I'll not send thing to devel list that I don't want
> > to be picked on. This is completely out of context.
>
> Am I misunderstanding something? It seems like a valid concern to me.

Besides that my email started with the fact that it is what it is, whether
you like it or not, I continued with the possibilities we have.

I took this conversation as a mean for improvement. But it turned out
to be PR for systemd-resolved.

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-07 Thread Tomas Hozza

On 07.12.2015 16:44, Andrew Lutomirski wrote:
>
> On Dec 7, 2015 1:49 AM, "Tomas Hozza" <tho...@redhat.com 
> <mailto:tho...@redhat.com>> wrote:
> >
> > On 04.12.2015 15:57, Lennart Poettering wrote:
> > > On Tue, 01.12.15 11:15, Tomas Hozza (tho...@redhat.com 
> > > <mailto:tho...@redhat.com>) wrote:
> > >
> > >> You are not mistaken.
> > >>
> > >> This is the third time, because previously we rather moved the change to 
> > >> the
> > >> next Fedora to bring better user experience. Every time there was 
> > >> something
> > >> enhanced, since we learned a lot about user use-cases, so this is 
> > >> definitely
> > >> not the same change as before, only the root idea is the same. The 
> > >> Change Wiki
> > >> is up-to-date and contains the current information.
> > >>
> > >> Also with many projects involved - Gnome Shell, NetworkManager, Unbound,
> > >> dnssec-trigger, SELinux (always a pleasure:), Docker... it is not the 
> > >> easiest
> > >> thing to agree on changes and coordinate everything on time.
> > >
> > > So, here's a question: in germany "Fritzbox" wifi routers are very
> > > popular. Their configuration page is reachable under the "fritz.box"
> > > pseudo-domain from inside their wifi network, and all other systems on
> > > the network are also eachable below this domain under their
> > > DHCP-configured hostnames. It implements a DNS proxy otherwise, only
> > > synthesizing A/ RRs for *.box. Now, one can certainly argue that
> > > this is borked, since the manufacturer doesn't own the ".box" domain,
> > > but discussing this is pretty pointless, as the fact that this is what
> > > is deployed in probably half of the homes in Germany... Also I am
> > > pretty sure other routers form other manufacturers do the same
> > > thing. Now, if we default to DNSSEC validation soon, does this mean
> > > people won't be able to configure their wifi routers anymore, or reach
> > > other systems on their home networks anymore, because the NSEC/NSEC3
> > > RRs in the root domain claim .box does not exist?  What's your
> > > strategy there?  Why do you think DNSSEC is worth breaking pretty much
> > > everybody's network? Note that Fritzbox is not a random crappy router,
> > > it's probably of the better products you can find.
> >
> > As you've said, this is basically an attack and hijacking of someone's
> > else domain name space. It is not correct and it is not expected that
> > this will work with DNSSEC.
> >
> > Now, we realized some time ago, that there are situations where the
> > local network-provided resolvers should be used to some extent, even
> > if they don't support DNSSEC. We think that such resolvers could be
> > used for INSECURE or INDETERMINATE answers and requeried. This would
> > allow you to use the local resources from the network.
> >
> > Obviously this would not work with TLDs, since the root zone is signed
> > and therefore you should never get an INSECURE answer for TLD. The same
> > for any non-existing subdomain of a signed domain, etc.
> >
> > The mechanism of using the network provided resolvers is something
> > we were trying to get into the "DNSSEC roadblock avoidance" IETF
> > RFC draft [1]. We have an experimental "mixed-mode" [2] module for Unbound,
> > however it is still not in upstream, because we were waiting for the
> > algorithm to get into the RFC draft.
> >
> > I think we could extend the module with an option to configure list of 
> > domains
> > for which you would like to fallback to the local resolvers, even if the
> > answer was SECURE. This could be used for the non-existing or "abused" TLDs.
> > Note that IETF is thinking about reserving some of such domains as private 
> > [3],
> > so once it is standardized, it could be done for these automatically.
> >
>
> Can you elaborate a bit?  Is the intent that, if .box were private, then .box 
> would be forwarded to DHCP-provided revolvers regardless of whether those 
> resolvers were functional when asking for DNSSEC signature data?
>
> If so, what cases does this not cover?  It fails in the split-horizon 
> DNSSEC-enabled case where the domain owner hasn't set it up right, but I'd 
> argue that that's a good thing.

I think that explicit list of domains would cover pretty much any use-case. We 
were thinking about configuring the 

Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-07 Thread Tomas Hozza
On 05.12.2015 18:57, Florian Weimer wrote:
> On 11/30/2015 05:14 PM, Jan Kurik wrote:
>> We want to have Unbound server installed and running on localhost by
>> default on Fedora systems. Where necessary, have also dnssec-trigger
>> installed and running by default
> 
> Would someone please clarify the proposal if Unbound would run as a
> forwarder, or as a stand-alone recursive resolver?

It depends on the network. If the resolvers from the DHCP are usable
for DNSSEC, then these will be used as forwarders. Nevertheless, Unbound
does the validation locally, so it will query for all the necessary
data to build the chain of trust.

In case the network-provided resolvers are not usable for DNSSEC, then
Unbound is configured to do the recursion.

In case this is blocked on the network, Unbound is configured to tunnel
the DNS queries to Fedora public infrastructure over TCP (80, 443) or
SSL (443), in which case this is similar to the first situation, when
Unbound forwards queries to the resolvers, but does the validation
locally.

This is part of dnssec-trigger documentation, since it is used as the
mean to reconfigure Unbound.

Tomas

> Thanks,
> Florian
> --
> devel mailing list
> devel@lists.fedoraproject.org
> http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
> 

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Layered Docker Image Build Service

2015-12-04 Thread Tomas Hozza
On 03.12.2015 15:40, Adam Miller wrote:
> On Thu, Dec 3, 2015 at 8:12 AM, Tomas Hozza <tho...@redhat.com> wrote:
> > On 03.12.2015 14:54, Jan Kurik wrote:
> >> On Thu, Dec 3, 2015 at 2:38 PM, Tomas Hozza <tho...@redhat.com> wrote:
> >>> On 03.12.2015 11:40, Jan Kurik wrote:
> >>>> = Proposed System Wide Change: Layered Docker Image Build Service =
> >>>> https://fedoraproject.org/wiki/Changes/Layered_Docker_Image_Build_Service
> >>>>
> >>>> Change owner(s):
> >>>> * Colin Walters 
> >>>> * Adam Miller 
> >>>> * Tomas Tomecek 
> >>>> * Tim Waugh 
> >>>> * Amanda Carter 
> >>>>
> >>>> Fedora currently ships a Docker base image, but Docker supports a
> >>>> layering concept. There are some applications like Cockpit which we
> >>>> would like to ship as layered applications.
> >>>> This change will deploy the build service to support building and
> >>>> delivering a set of layered Docker images, and will enable Fedora
> >>>> contributors to create and maintain Dockerfiles from which those
> >>>> images will be generated.
> >>>>
> >>>> == Detailed Description ==
> >>>> This change opens up an new type of official binary artifact produced
> >>>> by Fedora. Currently, we produce two main types of artifacts: RPMs,
> >>>> and images. The RPMs are created in Koji from specfiles in dist-git.
> >>>> The images come in different formats, but have in common creation in
> >>>> Koji from kickstart files — this includes the official Fedora Docker
> >>>> Base Image. This change introduces a new type of image, a Docker
> >>>> Layered Image, which is created from a Dockerfile and builds on top of
> >>>> that base image.
> >>>>
> >>>> The system has five major parts:
> >>>>
> >>>> A command-line client — already integrated into rpkg; needs only minor
> >>>> work to enable in fedpkg (there is discussion about either extending
> >>>> fedpkg or adding a new fedcontainer utility)
> >>>> * dist-git for Dockerfiles
> >>>> * A koji plugin, containerbuild
> >>>> * An OpenShift 3 backend
> >>>> * A distribution mechanism; a Docker Registry
> >>>> * Currently evaluating options for this
> >>>> * * Pulp Crane
> >>>> * * Docker Registry
> >>>>
> >>>> == Scope ==
> >>>> For the Scope of this Change please check
> >>>> https://fedoraproject.org/wiki/Changes/Layered_Docker_Image_Build_Service#Scope
> >>>>
> >>>
> >>> Hi.
> >>>
> >>> The "Ongoing Work Tracking" link does not work.
> >>
> >> Fixed. Thanks for verifying.
> >>
> >>> How is this different from the proposal for Fedora 23 [1]?
> >>> What changed?
> >>
> >> It is not different. The project has started at F23 time however has
> >> not been finished on time. This is continuation of the project.
> >
> > I'm curious to hear from the change owners if anything changed and
> > what pieces that blocked this from being done last time are still pending
> > and what is already done.
>
> It was a few things but the biggest issue was that upstream docker was
> in-flight on retiring the old image format (V1) in favor of the new
> one (V2) which has implications on how a "non-native" docker build
> system (read: something other than the docker daemon) can
> import/export docker images to and from a registry which required a
> lot of re-engineering the backend of the OSBS build system. Basically
> the "docker save" functionality disappeared in V2 upstream without any
> replacement. This work is mostly done and the build system can work
> with V2 registries now.
>
> I'm also not entirely sure this is a "system wide change" as others
> might classify it. For people who are just using Fedora, if we missed
> the deadline or messed something up, they wouldn't notice so it's
> possible this needs to change in classification.

Thank you for the explanation.

Would regular Fedora contributors be able to create and build Layered
Docker images using OSBS? Or will this be usable only for the official
images produced as part of Fedora Products?

E.g. if I think it would be beneficial to ship some package/service that
is already shipped in Fedora as Docker image, will there

Re: F24 System Wide Change: Layered Docker Image Build Service

2015-12-03 Thread Tomas Hozza
On 03.12.2015 11:40, Jan Kurik wrote:
> = Proposed System Wide Change: Layered Docker Image Build Service =
> https://fedoraproject.org/wiki/Changes/Layered_Docker_Image_Build_Service
> 
> Change owner(s):
> * Colin Walters 
> * Adam Miller 
> * Tomas Tomecek 
> * Tim Waugh 
> * Amanda Carter 
> 
> Fedora currently ships a Docker base image, but Docker supports a
> layering concept. There are some applications like Cockpit which we
> would like to ship as layered applications.
> This change will deploy the build service to support building and
> delivering a set of layered Docker images, and will enable Fedora
> contributors to create and maintain Dockerfiles from which those
> images will be generated.
> 
> == Detailed Description ==
> This change opens up an new type of official binary artifact produced
> by Fedora. Currently, we produce two main types of artifacts: RPMs,
> and images. The RPMs are created in Koji from specfiles in dist-git.
> The images come in different formats, but have in common creation in
> Koji from kickstart files — this includes the official Fedora Docker
> Base Image. This change introduces a new type of image, a Docker
> Layered Image, which is created from a Dockerfile and builds on top of
> that base image.
> 
> The system has five major parts:
> 
> A command-line client — already integrated into rpkg; needs only minor
> work to enable in fedpkg (there is discussion about either extending
> fedpkg or adding a new fedcontainer utility)
> * dist-git for Dockerfiles
> * A koji plugin, containerbuild
> * An OpenShift 3 backend
> * A distribution mechanism; a Docker Registry
> * Currently evaluating options for this
> * * Pulp Crane
> * * Docker Registry
> 
> == Scope ==
> For the Scope of this Change please check
> https://fedoraproject.org/wiki/Changes/Layered_Docker_Image_Build_Service#Scope
> 

Hi.

The "Ongoing Work Tracking" link does not work.

How is this different from the proposal for Fedora 23 [1]?
What changed?

[1] https://fedorahosted.org/fesco/ticket/1461

Thanks!

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org

Re: F24 System Wide Change: Layered Docker Image Build Service

2015-12-03 Thread Tomas Hozza
On 03.12.2015 14:54, Jan Kurik wrote:
> On Thu, Dec 3, 2015 at 2:38 PM, Tomas Hozza <tho...@redhat.com> wrote:
>> On 03.12.2015 11:40, Jan Kurik wrote:
>>> = Proposed System Wide Change: Layered Docker Image Build Service =
>>> https://fedoraproject.org/wiki/Changes/Layered_Docker_Image_Build_Service
>>>
>>> Change owner(s):
>>> * Colin Walters 
>>> * Adam Miller 
>>> * Tomas Tomecek 
>>> * Tim Waugh 
>>> * Amanda Carter 
>>>
>>> Fedora currently ships a Docker base image, but Docker supports a
>>> layering concept. There are some applications like Cockpit which we
>>> would like to ship as layered applications.
>>> This change will deploy the build service to support building and
>>> delivering a set of layered Docker images, and will enable Fedora
>>> contributors to create and maintain Dockerfiles from which those
>>> images will be generated.
>>>
>>> == Detailed Description ==
>>> This change opens up an new type of official binary artifact produced
>>> by Fedora. Currently, we produce two main types of artifacts: RPMs,
>>> and images. The RPMs are created in Koji from specfiles in dist-git.
>>> The images come in different formats, but have in common creation in
>>> Koji from kickstart files — this includes the official Fedora Docker
>>> Base Image. This change introduces a new type of image, a Docker
>>> Layered Image, which is created from a Dockerfile and builds on top of
>>> that base image.
>>>
>>> The system has five major parts:
>>>
>>> A command-line client — already integrated into rpkg; needs only minor
>>> work to enable in fedpkg (there is discussion about either extending
>>> fedpkg or adding a new fedcontainer utility)
>>> * dist-git for Dockerfiles
>>> * A koji plugin, containerbuild
>>> * An OpenShift 3 backend
>>> * A distribution mechanism; a Docker Registry
>>> * Currently evaluating options for this
>>> * * Pulp Crane
>>> * * Docker Registry
>>>
>>> == Scope ==
>>> For the Scope of this Change please check
>>> https://fedoraproject.org/wiki/Changes/Layered_Docker_Image_Build_Service#Scope
>>>
>>
>> Hi.
>>
>> The "Ongoing Work Tracking" link does not work.
> 
> Fixed. Thanks for verifying.
> 
>> How is this different from the proposal for Fedora 23 [1]?
>> What changed?
> 
> It is not different. The project has started at F23 time however has
> not been finished on time. This is continuation of the project.

I'm curious to hear from the change owners if anything changed and
what pieces that blocked this from being done last time are still pending
and what is already done.

Thanks.

Tomas

> Regards,
> Jan
> 
>> [1] https://fedorahosted.org/fesco/ticket/1461
>>
>> Thanks!
>>
>> Regards,
>> --
>> Tomas Hozza
>> Software Engineer - EMEA ENG Developer Experience
>>
>> PGP: 1D9F3C2D
>> UTC+1 (CET)
>> Red Hat Inc. http://cz.redhat.com
>> --
>> devel mailing list
>> devel@lists.fedoraproject.org
>> http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
> 
> 
> 

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-02 Thread Tomas Hozza
On 02.12.2015 14:03, Neal Becker wrote:
> Neal Becker wrote:
> 
>> P J P wrote:
>>
>>> Hello Neal,
>>>
>>>> On Wednesday, 2 December 2015 1:03 AM, Neal Becker wrote:
>>>> For example, when I'm at work, I can access hostA.work.com
>>>> where resolving hostA only works by talking to dnsserverA.work.com,
>>>> which was setup by the usual dhcp and then when I'm at home
>>>>
>>>> google.com is resolved as normal, using my ISP's dhcp to configure dns.
>>>> And this must work without the user ever editing some unbound config
>>>> file.
>>>
>>>
>>>   Yes, it does work that way. The proposed solution(tools) is available
>>>   in
>>> current Fedora repositories and is easy to set-up and test.
>>>
>>>
>>>   ->
>>>   
>>
> https://fedoraproject.org/wiki/Changes/Default_Local_DNS_Resolver#How_To_Test
>>>
>>>
>>> Please let us know if you face any difficulties. Thank you.
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=1287607
>>
>>
> So remaining difficulties are:
> 
> * howto prevent dnsmasq from starting (right now I'm just manually killing 
> it for testing)

This is needed only if you intentionally started dnsmasq. You don't need to kill
all dnsamsq instances in the system (e.g. the ones started by libvirt). I'll 
review
the change wiki in this regard.

> * howto get domainname set automatically from dhcp

As discussed in the Bug, this is not going to work and it is expected not to.
Setting search domains from DHCP is a security issue.


Tomas

> --
> devel mailing list
> devel@lists.fedoraproject.org
> http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org
> 

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-01 Thread Tomas Hozza
You are not mistaken.

This is the third time, because previously we rather moved the change to the
next Fedora to bring better user experience. Every time there was something
enhanced, since we learned a lot about user use-cases, so this is definitely
not the same change as before, only the root idea is the same. The Change Wiki
is up-to-date and contains the current information.

Also with many projects involved - Gnome Shell, NetworkManager, Unbound,
dnssec-trigger, SELinux (always a pleasure:), Docker... it is not the easiest
thing to agree on changes and coordinate everything on time.

What changed from the top of my head:
- We decided not to install the dnssec-trigger panel by default and rather
  better integrate dnssec-trigger with NM and Gnome Shell
- We decided not to query user for security decisions, and for the beginning
  if there is no other option just fall back to the current state that that is
  in Fedora today
- better handling of environments, where the resolvers on the network don't
  support DNSSEC by new Unbound plugin. This is still not in upstream, since
  we wanted to get the algorithm to the RFC draft that is currently discussed 
  on IETF WG 
(http://www.ietf.org/id/draft-ietf-dnsop-dnssec-roadblock-avoidance-02.txt)
- dnssec-trigger does not do the Captive Portal detection and handling and
  we rather rely on NM for the detection and on Gnome Shell for the Portal login
- Some enhancements of the portal helper in Gnome Shell are being reviewed,
  (it will not rely on the resolv.conf content and rather use sandboxed 
environment
  with resolv.conf containing resolvers for the connection from NM).

If you check the "decisions made" part of the change wiki, it discusses
the important outcomes of discussions.

Some of these things are not polished, implemented or merged upstream yet,
but we are working on them with the F24 schedule in mind. We are also
communicating with NM and Gnome devels and will discuss the defaults with
WGs with some Product, once FESCo approves the change.


Regards,
Tomas

On 01.12.2015 09:14, Vít Ondruch wrote:
> If I am not mistaken, this is at least 3rd time this change is proposed.
> Can somebody post some short summary what was changed, that you believe
> it will be successful this time?
>
> Thx
>
>
> Vít
>
>
> Dne 30.11.2015 v 17:14 Jan Kurik napsal(a):
> > = Default Local DNS Resolver =
> > https://fedoraproject.org/wiki/Changes/Default_Local_DNS_Resolver
> >
> > Change owner(s):
> > * P J P 
> > * Pavel Šimerda 
> > * Tomas Hozza 
> > * Petr Špaček 
> >
> > Plain DNS protocol is insecure and therefore vulnerable from various
> > attacks (e.g. cache poisoning). A client can never be sure that there
> > is no man-in-the-middle, if it does not do the DNSSEC validation
> > locally.
> > We want to have Unbound server installed and running on localhost by
> > default on Fedora systems. Where necessary, have also dnssec-trigger
> > installed and running by default. Unbound and dnssec-trigger will be
> > properly integrated with the default network configuration manager
> > (e.g. NetworkManager for Fedora Server and Workstation) and with the
> > graphical user interface (especially GNOME). The localhost address
> > will be the only record in /etc/resolv.conf and no other software
> > except dnssec-trigger will be allowed to change its content.
> >
> >
> >
> > == Detailed Description ==
> > Plain DNS protocol is insecure and therefore vulnerable from various
> > attacks (e.g. cache poisoning). DNSSEC is a DNS extension which
> > enabled the client to verify the DNS query response and make sure
> > there is no attacker to spoof some records. A user connected to
> > network usually receives a set of resolvers from DHCP, which should be
> > used for name resolution. These resolvers may also do the DNSSEC
> > validation. However a client can never be sure that there is no
> > man-in-the-middle, if it does not do the DNSSEC validation locally.
> > Purpose of this Fedora change is to have a validating DNS resolver
> > installed on Fedora systems by default. This includes necessary
> > discussions, coordination and integration with other components
> > installed on Fedora by default.
> >
> > There are growing instances of discussions and debates about the need
> > for a trusted local validating DNS resolver. There are multiple
> > reasons for having such a resolver, most importantly security and
> > usability. Security and protection of user's privacy becomes paramount
> > with the backdrop of the increasingly snooping governments and service
> > providers world wide.
> >
> > People use Fedora on portable/mobile devices which are connected to
&g

Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-01 Thread Tomas Hozza
On 01.12.2015 16:06, Björn Persson wrote:
> Tomas Hozza <tho...@redhat.com> wrote:
> > - dnssec-trigger does not do the Captive Portal detection and handling and
> >   we rather rely on NM for the detection and on Gnome Shell for the Portal 
> > login
>
> Can I assume that users of non-Gnome desktops will also be able to log
> in to a portal if they want to?

Yes, it should be possible. You would need to install the dnssec-trigger-panel.

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org

Re: F24 System Wide Change: Default Local DNS Resolver

2015-12-01 Thread Tomas Hozza
On 01.12.2015 13:28, Tomas Mraz wrote:
> On Út, 2015-12-01 at 11:15 +0100, Tomas Hozza wrote:
> > You are not mistaken.
> >
> > This is the third time, because previously we rather moved the change to the
> > next Fedora to bring better user experience. Every time there was something
> > enhanced, since we learned a lot about user use-cases, so this is definitely
> > not the same change as before, only the root idea is the same. The Change 
> > Wiki
> > is up-to-date and contains the current information.
> >
> > Also with many projects involved - Gnome Shell, NetworkManager, Unbound,
> > dnssec-trigger, SELinux (always a pleasure:), Docker... it is not the 
> > easiest
> > thing to agree on changes and coordinate everything on time.
> >
> > What changed from the top of my head:
> > - We decided not to install the dnssec-trigger panel by default and rather
> >   better integrate dnssec-trigger with NM and Gnome Shell
> > - We decided not to query user for security decisions, and for the beginning
> >   if there is no other option just fall back to the current state that that 
> > is
> >   in Fedora today
>
> Will there be at least some visual indicator that the network you're
> connected to does not provide secure DNS?

Not that the network does not provide secure DNS, but only that the local DNS
resolver is not able to use DNSSEC. This information makes sense on the system
level, not really on the connection level (although technically it is possible).

We are still working on the solution. Nevertheless it should be native WRT
the desktop environment on Fedora Workstation.

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org

Summary/Minutes from today's FESCo Meeting (2015-11-25)

2015-11-26 Thread Tomas Hozza
On 25.11.2015 10:03, Tomas Hozza wrote:
> Following is the list of topics that will be discussed in the FESCo
> meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.
>
> To convert UTC to your local time, take a look at
>   http://fedoraproject.org/wiki/UTCHowto
>
> or run:
>   date -d '2015-11-25 18:00 UTC'
>
>
> Links to all tickets below can be found at:
> https://fedorahosted.org/fesco/report/9
>
> = Followups =
>
>
> = New business =
>
> #topic #1500 Deactivate accounts that infra could not contact for 7 days.
> .fesco 1500
> https://fedorahosted.org/fesco/ticket/1500
>
> #topic #1501 F24 System Wide Change: Systemd package split
> .fesco 1501
> https://fedorahosted.org/fesco/ticket/1501
>
> #topic #1502 F24 System Wide Change: Systemd file triggers
> .fesco 1502
> https://fedorahosted.org/fesco/ticket/1502
>
> #topic #1503 F24 System Wide Change: GHC 7.10
> .fesco 1503
> https://fedorahosted.org/fesco/ticket/1503
>
> = Open Floor =
>
> For more complete details, please visit each individual ticket.  The
> report of the agenda items can be found at
> https://fedorahosted.org/fesco/report/9
>
> If you would like to add something to this agenda, you can reply to
> this e-mail, file a new ticket at https://fedorahosted.org/fesco,
> e-mail me directly, or bring it up at the end of the meeting, during
> the open floor topic. Note that added topics may be deferred until
> the following meeting.
>
> Regards,
>

===
#fedora-meeting: FESCO (2015-11-25)
===


Meeting started by thozza at 18:00:21 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting/2015-11-25/fesco.2015-11-25-18.00.log.html
.



Meeting summary
---
* init process  (thozza, 18:00:21)

* #1500 Deactivate accounts that infra could not contact for 7 days.
  (thozza, 18:03:40)
  * AGREED: Request from ticket #1500 is approved, however please
consider longer period than 1 hour between the emails. (+6, 0, -0)
(thozza, 18:10:13)

* #1501 F24 System Wide Change: Systemd package split  (thozza,
  18:10:25)
  * LINK: https://fedorahosted.org/fesco/ticket/1501   (thozza,
18:12:36)
  * AGREED: F24 System Wide Change: Systemd package split is approved
(+7, 0, -0)  (thozza, 18:13:39)

* #1502 F24 System Wide Change: Systemd file triggers  (thozza,
  18:13:59)
  * AGREED: F24 System Wide Change: Systemd file triggers is approved
(+7, 0, -0)  (thozza, 18:18:31)

* #1503 F24 System Wide Change: GHC 7.10  (thozza, 18:18:47)
  * AGREED: F24 System Wide Change: GHC 7.10 is approved (+7, 0, -0)
(thozza, 18:21:15)

* Next week's chair  (thozza, 18:21:28)
  * paragan to chair next week  (thozza, 18:22:36)

* Open Floor  (thozza, 18:22:48)
  * zbyszek will remove the %post script from systemd package that
modifies the nsswitch.conf  (thozza, 18:35:48)
  * ACTION: zbyszek to modify systemd %post to remove my_machines from
the passwd: and group: lines in nsswitch.conf while the interaction
is sorted out between glibc, IDM and systemd upstreams.  (sgallagh,
18:52:47)

Meeting ended at 18:56:03 UTC.




Action Items

* zbyszek to modify systemd %post to remove my_machines from the passwd:
  and group: lines in nsswitch.conf while the interaction is sorted out
  between glibc, IDM and systemd upstreams.




Action Items, by person
---
* zbyszek
  * zbyszek to modify systemd %post to remove my_machines from the
passwd: and group: lines in nsswitch.conf while the interaction is
sorted out between glibc, IDM and systemd upstreams.
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* thozza (62)
* sgallagh (36)
* zodbot (12)
* zbyszek (12)
* number80 (11)
* nirik (10)
* simo (10)
* rishi` (7)
* paragan (7)
* jkurik (3)
* rishi (0)
* ajax (0)
* hguemar (0)
* jwb (0)
* dgilmore (0)


Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com
--
devel mailing list
devel@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/devel@lists.fedoraproject.org


Schedule for Wednesday's FESCo Meeting (2015-11-25)

2015-11-25 Thread Tomas Hozza
Following is the list of topics that will be discussed in the FESCo
meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2015-11-25 18:00 UTC'


Links to all tickets below can be found at: 
https://fedorahosted.org/fesco/report/9

= Followups =


= New business =

#topic #1500 Deactivate accounts that infra could not contact for 7 days.
.fesco 1500
https://fedorahosted.org/fesco/ticket/1500

#topic #1501 F24 System Wide Change: Systemd package split
.fesco 1501
https://fedorahosted.org/fesco/ticket/1501

#topic #1502 F24 System Wide Change: Systemd file triggers
.fesco 1502
https://fedorahosted.org/fesco/ticket/1502

#topic #1503 F24 System Wide Change: GHC 7.10
.fesco 1503
https://fedorahosted.org/fesco/ticket/1503

= Open Floor = 

For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at
https://fedorahosted.org/fesco/report/9

If you would like to add something to this agenda, you can reply to
this e-mail, file a new ticket at https://fedorahosted.org/fesco,
e-mail me directly, or bring it up at the end of the meeting, during
the open floor topic. Note that added topics may be deferred until
the following meeting. 

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+1 (CET)
Red Hat Inc. http://cz.redhat.com

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Fedora IPv6 testing and improvements - request for ideas

2015-11-04 Thread Tomas Hozza
On 04.11.2015 15:22, Pavel Simerda wrote:
> - Original Message -
> > From: "Zdenek Kabelac" <zkabe...@redhat.com>
> > To: "Development discussions related to Fedora" 
> > <devel@lists.fedoraproject.org>
> > Sent: Wednesday, November 4, 2015 1:43:12 PM
> > Subject: Re: Fedora IPv6 testing and improvements - request for ideas
> >
> > Dne 4.11.2015 v 13:24 Petr Spacek napsal(a):
> >> On 3.11.2015 18:50, Moez Roy wrote:
> >>> Hi Pavel Simerda,
> >>>
> >>> The IPv6 updates are breaking stuff (and probably increasing the
> >>> attack surface):
> >>>
> >>> Bug 1231946 - unbound-anchor ignores net.ipv6.conf.all.disable_ipv6=1
> >>> in /etc/sysctl.conf
> >>> https://bugzilla.redhat.com/show_bug.cgi?id=1231946
> >>>
> >>> Bug 1251762 - dnssec-triggerd ignores net.ipv6.conf.all.disable_ipv6=1
> >>> in /etc/sysctl.conf
> >>> https://bugzilla.redhat.com/show_bug.cgi?id=1251762
> >>>
> >>> (maybe other software like avahi also don't remember right now)
> >>>
> >>> You can reproduce this by putting "ipv6.disable=1" in the kernel command
> >>> line.
> >>>
> >>> Doing 'setsebool -P domain_kernel_load_modules 1' would reduce the
> >>> security provided by SELinux so it is not an option.
> >>>
> >>> Would appreciate fixes please. Thanks.
> >>
> >> "ipv6.disable=1" or blacklisting ipv6 modules is going against contemporary
> >> ways how network APIs. Many contemporary software projects are
> >> using IPv6-enabled network calls by default because both IPv6 and IPv4
> >> share the same name space on the machine so you only need to listen on a
> >> IPv6 port to accept both IPv4 and IPv6.
> >>
> >> Apparently this is not Fedora-specific in any way because ArchLinux says
> >> the same:
> >> https://wiki.archlinux.org/index.php/IPv6#Disable_IPv6
> >>
> >> "net.ipv6.conf.all.disable_ipv6=1" is good enough and should not have
> >> negative
> >> side-effects of "ipv6.disable=1".
> >>
> >> Having said that, I'm proposing to close all issues caused by
> >> "ipv6.disable=1"
> >> as WONTFIX.
> >
> > Hi
> >
> > I strongly object against this idea.
> >
> > System needs to work in  IPv4 environment  and with kernel without IPv6
> > enabled.
> >
> > There is number of reasons for keeping this possibility enabled - e.g.
> > I want to use  older kernel for regression testing, I want to have disabled
> > IPv6 stack for security reasons and lots of other...
>
> I'm not taking any side in this discussion and will mostly attempt to reflect
> actual usage, i.e. most installations dual-stack, some installations with
> IPv6 disabled, no installations with IPv4 disabled (due to kernel inability
> to disable IPv4).
>
> > So please do not replace coder's inability
>
> The project is about IPv6 and dual-stack testing and improvements. Insulting
> authors who didn't make their software work with ipv6.disabled=1 isn't 
> helpful.
>
> > to write correct code to handle dual socket interface
>
> In some cases software authors do not expect a situation when
> `socket(family=AF_INET6)` fails but `socket(family=AF_INET)`
> succeeds. It is indeed a very special situation that such a
> basic thing in the system fails.
>
> And that is indeed a very special situation. On most installation
> the `socket()` calls with correct arguments will never fail. And
> the IPv4 variant won't fail in any case which creates an undue
> assymetry.
>
> > with disabling usage of while Fedora on kernel with
> > IPv6 disabled.
> >
> > I'm fine if the particular software package would be  IPv6 only - as long
> > as there is no IPv4-only user who cares - it's correct way.
>
> Whether a package is IPv6 only and whether a package works with
> ipv6.disabled=1 are two distinct things that need to be tested
> separately. On the other IPv6 only packages are a very rare
> phenomenon.
>
> > Just do NOT make such package a core system dependency - it has to remain
> > optional.
>
> I don't see any reason to make a distinction between a dual-stack package
> with IPv4 and IPv6 functionality and two distinct packages, one IPv4 only,
> the other IPv6 only in this respect. Either way you end up with features
> required for both protocols.
>
> Anyway, are there any specific packages that are mandatory in Fedora or
> might become so? I'd like to avoid discussions about something purely
> hypothetical.

With the default DNS resolver change Unbound and dnssec-trigger would be
installed by default.

> Cheers,
>
> Pavel
>

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
UTC+2 (CEST)
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Summary of Thursday's call between GNOME and NM devels and Default DNS resolver change owners

2015-07-17 Thread Tomas Hozza
Hello all.

I would like to share the outcome of the discussion between GNOME and NM 
developers
and the Default DNS resolver [1] Change for F23.

The full summary can be found here [2] and recording here [3] is anyone is 
interested.


Integration points:
- Captive portal detection
- Captive portal handling
- User interaction


Points we agreed on:
* Captive portal detecion
  * NM side
* NM will be the only daemon doing Captive portal detection
* NM moves connectivity check before NM_DEVICE_STATE_ACTIVATED, emits 
signal before network is up
* If portal has been detected, NM blocks NM_DEVICE_STATE_ACTIVATED for a 
specific device until there is no more portal
* NM regularly does the Captive portal detection (connectivity check) to 
determine if the login using GNOME was already done
* Once the login was done and Internet connectivity is detected, NM 
triggers some event in nm-dispatcher (or something like that)
  * GNOME side
* GNOME Shell does not do detection itself, but relies on the NM (as 
already done)
* GNOME is watching the change of connectivity state property in NM
  * dnssec-trigger side
* Does not do any detection
* does not do any user interaction
* Only relies on events triggered by NM and acts based on the connectivity 
status

* Captive portal handling (login)
  * GNOME side
* If Captive portal is detected, then browser window is launched
* The browser window ls launched with LD_PRELOAD 
(https://github.com/hadess/resolvconf-override) as resolv.conf override
* GNOME should fetch the connection-provided DNS servers using NM API 
(existing) and use those for LD_PRELOAD solution
  * dnssec-trigger side
* does not do any user interaction
* Only relies on events triggered by NM and acts based on the connectivity 
status

* User interface / user interaction
  * Fedora Workstation product
* GNOME shell
  * informs the user about the Captive portal
  * launches the window 
* dnssec-trigger
  * the applet will be split into separate package and not installed by 
default (already done)
  * if all falbacks fail, it switches automatically to Insecure mode (no 
DNSSEC validation) without user interaction
* automatic switch to insecure mode will be possible to turn off using 
configuration file for expert users
* a notification can be emited about switching to insecure mode (so far 
by default OFF)
  * Other desktops / Spins
* dnssec-trigger applet
  * should handle the UI that is usually handled by GNOME Shell (if there 
is not any specific Spin implementation to do that, i.e. if GNOME is not in use)
  * Captive portal detection will be still done in NM

* under discussion:
  * notification can be turned OFF by default, but configurable in config file 
for expert users - unfortunatelly this will not create pressure on admins to 
fix the networks
  * alternative: display a message which will say that local network is broken 
and that admin should be woken up:
* 'Your network is seriously broken. Go and kick your network admin NOW!
* This broken network will stop working from Fedora 24 on because it does 
not support DNSSEC. (Tell this to your admin!)'


[1] https://fedoraproject.org/wiki/Changes/Default_Local_DNS_Resolver
[2] https://www.piratepad.ca/p/default-dns-resolver-f23
[3] https://bluejeans.com/s/8pTY/


Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Summary/Minutes from today's FESCo Meeting (2015-07-01)

2015-07-07 Thread Tomas Hozza


On 02.07.2015 17:56, Chris Murphy wrote:
 On Thu, Jul 2, 2015 at 9:45 AM, Stephen Gallagher sgall...@redhat.com wrote:
 On Thu, 2015-07-02 at 10:33 -0500, Michael Catanzaro wrote:
 On Thu, 2015-07-02 at 09:55 +0200, Tomas Hozza wrote:
   * AGREED: Netizen is not approved as spin. We approve the option
 to
 have netizen as optional suite in anaconda. Please work with
 Workstation WG. (+7, 0, -0)  (thozza, 18:48:50)

 Hi, maybe there was some misunderstanding about the Workstation
 installer, but we don't allow configuration of package selection.
 Users
 are expected to use GNOME Software once the system is up and running.

 There were two combined statements there. The first was that we would
 consider making certain netizen-oriented options available at install
 -time. The second is that we would prefer to see tooling and
 configuration done inside the Workstation, KDE (and other?)
 environments rather than as a separate spin.
 
 The Workstation live installer doesn't have any installation options.
 The UI isn't even present in the installer. It's a single payload, all
 or nothing. It would have to be done as a group in GNOME Software.

How is the Live installer different from the network installer? Is it
just some configuration thing, or are those completely different
installers? It looked like regular Anaconda last time I installed
Workstation.

I'm just trying to understand if you don't want to give the user the
option to choose the installation options from live CD on purpose (due
to user experience or such) or if there is some real issue?

 The Workstation network installer has installation options.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Summary/Minutes from today's FESCo Meeting (2015-07-01)

2015-07-02 Thread Tomas Hozza
===
#fedora-meeting: FESCO (2015-07-01)
===


Meeting started by thozza at 18:01:35 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting/2015-07-01/fesco.2015-07-01-18.01.log.html
.



Meeting summary
---
* init process  (thozza, 18:01:36)

* #1450 F23 System Wide Change: Python 3 as the Default Implementation
  (thozza, 18:05:02)
  * AGREED: let's make python3 the only python interpreter on default
installs (+5, 0, -1)  (thozza, 18:27:02)
  * Supplementary proposal to treat python2-only work as a bug in the
implementation had insufficient votes (+2, 0, -3)  (sgallagh,
18:30:40)

* #1445 F23 Self Contained Changes  (thozza, 18:31:00)
  * AGREED: All self-contained changes are approved (except netizen spin
and io.js which are discussed separately) (+5, 0, -1)  (thozza,
18:38:38)
  * AGREED: Netizen is not approved as spin. We approve the option to
have netizen as optional suite in anaconda. Please work with
Workstation WG. (+7, 0, -0)  (thozza, 18:48:50)
  * AGREED: io.js change: Let the owner consider replacing node.js
completely and revisit next week. (+7, 0, -0)  (thozza, 19:00:01)

* #1451 F23 System Wide Change: SELinux policy store migration  (thozza,
  19:00:21)
  * AGREED: F23 System Wide Change: SELinux policy store migration is
approved (+5, 0, -0)  (thozza, 19:05:55)

* #1452 F23 System Wide Change: Two Week Atomic  (thozza, 19:06:12)
  * AGREED: F23 System Wide Change: Two Week Atomic is approved (+6, 0,
-0)  (thozza, 19:10:30)

* #1453 F23 System Wide Change: Glibc locale subpackaging  (thozza,
  19:10:43)
  * AGREED: F23 System Wide Change: Glibc locale subpackaging is
approved. Please be careful with upgrade path. (+6, 0, -0)  (thozza,
19:16:17)

* #1454 F23 System Wide Change: Unicode 8.0 support  (thozza, 19:16:36)
  * AGREED: F23 System Wide Change: Unicode 8.0 support is approved (+6,
0, -0)  (thozza, 19:18:43)

* #1455 F23 System Wide Change: Standardized Passphrase Policy  (thozza,
  19:18:58)
  * postponed until there is some concrete proposal  (thozza, 19:19:17)

* Next week's chair  (thozza, 19:19:24)
  * paragan to chair next week  (thozza, 19:22:13)

* Open Floor  (thozza, 19:22:26)

Meeting ended at 19:30:09 UTC.




Action Items






Action Items, by person
---
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* thozza (171)
* sgallagh (69)
* ajax (54)
* number80 (51)
* jwb (50)
* rishi` (31)
* zodbot (20)
* paragan (19)
* rkuska (18)
* cleong (15)
* mstuchli (11)
* mhroncok (7)
* mgrepl (5)
* plautrba (4)
* jkurik (4)
* mfabian (2)
* maxamillion (2)
* pravins (2)
* mitr (1)
* jkurik_mtg (1)
* hguemar (0)
* rishi (0)
* nirik (0)
* dgilmore (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot

On 30.06.2015 12:02, Tomas Hozza wrote:
 Following is the list of topics that will be discussed in the FESCo
 meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

 To convert UTC to your local time, take a look at
   http://fedoraproject.org/wiki/UTCHowto

 or run:
   date -d '2015-07-01 18:00 UTC'


 Links to all tickets below can be found at:
 https://fedorahosted.org/fesco/report/9

 = Followups =

 #topic #1450 F23 System Wide Change: Python 3 as the Default
 Implementation
 .fesco 1450
 https://fedorahosted.org/fesco/ticket/1450

 #topic #1445 F23 Self Contained Changes
 .fesco 1445
 https://fedorahosted.org/fesco/ticket/1445

 = New business =

 #topic #1451 F23 System Wide Change: SELinux policy store migration
 .fesco 1451
 https://fedorahosted.org/fesco/ticket/1451

 #topic #1452 F23 System Wide Change: Two Week Atomic
 .fesco 1452
 https://fedorahosted.org/fesco/ticket/1452

 #topic #1453 F23 System Wide Change: Glibc locale subpackaging
 .fesco 1453
 https://fedorahosted.org/fesco/ticket/1453

 #topic #1454 F23 System Wide Change: Unicode 8.0 support
 .fesco 1454
 https://fedorahosted.org/fesco/ticket/1454

 #topic #1455 F23 System Wide Change: Standardized Passphrase Policy
 .fesco 1455
 https://fedorahosted.org/fesco/ticket/1455

 = Open Floor =

 For more complete details, please visit each individual ticket.  The
 report of the agenda items can be found at
 https://fedorahosted.org/fesco/report/9

 If you would like to add something to this agenda, you can reply to
 this e-mail, file a new ticket at https://fedorahosted.org/fesco,
 e-mail me directly, or bring it up at the end of the meeting, during
 the open floor topic. Note that added topics may be deferred until
 the following meeting.




-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza


On 30.06.2015 13:46, Stef Walter wrote:
 On 30.06.2015 11:24, Tomas Hozza wrote:
 On 26.06.2015 17:13, Matthias Clasen wrote:
 On Tue, 2015-06-23 at 18:43 +0200, Tomas Hozza wrote:

 Hey, I was out for a week, so this may be a bit of a late reply.

 As Michael and Bastien already stated, all the GNOME networking UI
 relies on information gotten from NetworkManager, and we'd like to keep
 it that way. In particular, NetworkManager has an existing API to
 inform us about captive portals - if at all possible, you should keep
 that working.

 Yes, it should work. We didn't change anything related to that. We just
 had our own implementation.

 [...]

 This boils down to what we need from some new version of the UI that 
 we
 need to be well integrated with GNOME:

 1. Be able to inform user about some situations (Captive portal
 detected, network blocks all DNS communication, ...) and enable the 
 user
 to take an action. (This could be possibly done by the notifications
 system in latest GNOME)

 - this may be solved also in GNOME already, and may be OK if done
 technically correctly. Please note my note earlier on NM notifying 
 other
 services when Captive Portal is detected

 My perspective on this is that we already have a UI: GNOME shell
 displays network status, including captive portal. If NetworkManager
 needs to add a few more connection states related to DNSSEC, we can
 adapt to that.

 The thing is that some information are unrelated to NM. There is no
 reason to push all information back to NetworkManager, since its role is
 explicitly defined - manage network connections and leave the DNS
 resolution and configuration up to different tool.

 GNOME shell also launches a browser when needed for captive portal
 login. If we need to tweak the way the browser is launched to make it
 work on a dnssec-enabled system, that should be possible.

 I was not able to determine if you rely on the system's stub resolver.
 If that is the case, NM should notify GNOME only after dnssec-trigger
 switches to hotspot signon mode.

 2. Possibly have some indicator showing if the system is in Secure 
 or
 Insecure state.

 3. Enable the user to switch between those two states manually

 This seems dubious, at best. What does it mean if my system is
 'insecure' ? Will my credit card number be stolen ? Will my system be
 taken over by intruders if I don't disconnect immediately ? Most users
 will have no idea, and have to treat such a switch either as scary,
 don't touch or as the fix the internet button.

 It means that the site of your bank you are on may not be provided the
 actual host you should be connected to, but instead by some attacker's.
 The insecure mode means that you are vulnerable in the same way as the
 plain DNS is. So you are insecure even now if you don't use DNSSEC
 without realizing it.
 
 Except if your bank is using https and you connected to it that way, and
 you have unbroken CA roots. and so on ...
 
 The combinatorial explosion of states between insecure (someone just
 stole my money) and secure (the NSA be crying because they can't touch
 this) ... means you end up with about  posibilities to explain to
 the user.
 
 It's not possible to represent all of this in a dialog. We'd have to
 print a book and mail to to the user.
 
 Stef
 

Right. I just tried to explain what insecure means in this context. I
agree that insecure is so generic, that it is hard or even impossible
to explain. Maybe something like use plain DNS vs. DNSSEC enabled is
better. But even the existing hotspot signon mode is OK. It was just
an idea, it is really the lowest priority issue, to rename the mode...

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza


On 30.06.2015 13:58, Stef Walter wrote:
 On 30.06.2015 13:53, Bastien Nocera wrote:


 - Original Message -
 On 30.06.2015 11:24, Tomas Hozza wrote:
 snip
 It means that the site of your bank you are on may not be provided the
 actual host you should be connected to, but instead by some attacker's.
 The insecure mode means that you are vulnerable in the same way as the
 plain DNS is. So you are insecure even now if you don't use DNSSEC
 without realizing it.

 Except if your bank is using https and you connected to it that way, and
 you have unbroken CA roots. and so on ...

 The combinatorial explosion of states between insecure (someone just
 stole my money) and secure (the NSA be crying because they can't touch
 this) ... means you end up with about  posibilities to explain to
 the user.

 It's not possible to represent all of this in a dialog. We'd have to
 print a book and mail to to the user.

 Which means that it needs to be opt-in for us not to have unbreak my 
 Internet
 buttons in the UI. Once DNSSEC is more widely deployed and we can safely
 assume that the majority of the Internet is used it, we can toggle it on.
 
 Yeah, that's one option.

No, it is not. It is opt-in now, we want it by default. Please read the
change. Thank you.

 Another is if dnssec-trigger can reliably detect the presence of DNSSEC
 on a given network, then it could enforce its use from then on.

Except that this is exactly what we DON'T want to do. DNSSEC is an
extension of DNS and it can be used even without the need for the whole
Internet to be signed. We want to use it even if the network-provided
DNS resolvers don't support DNSSEC.

 But making the user decide (or showing them a message) every time they
 connect to such networks is not the way to go.

Nobody ever said that we want to do that. This is exactly what we DON'T
want to do.

 Stef
 

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza
On 30.06.2015 13:53, Bastien Nocera wrote:
 
 
 - Original Message -
 On 30.06.2015 11:24, Tomas Hozza wrote:
 snip
 It means that the site of your bank you are on may not be provided the
 actual host you should be connected to, but instead by some attacker's.
 The insecure mode means that you are vulnerable in the same way as the
 plain DNS is. So you are insecure even now if you don't use DNSSEC
 without realizing it.

 Except if your bank is using https and you connected to it that way, and
 you have unbroken CA roots. and so on ...

 The combinatorial explosion of states between insecure (someone just
 stole my money) and secure (the NSA be crying because they can't touch
 this) ... means you end up with about  posibilities to explain to
 the user.

 It's not possible to represent all of this in a dialog. We'd have to
 print a book and mail to to the user.
 
 Which means that it needs to be opt-in for us not to have unbreak my 
 Internet
 buttons in the UI. Once DNSSEC is more widely deployed and we can safely
 assume that the majority of the Internet is used it, we can toggle it on.

This argument is not valid. DNSSEC is usable even without being deployed
everywhere. You are welcomed to turn the functionality off if you don't
care about security, we would like to turn DNSSEC validation by default
and are trying to find common ground to make it possible.

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza


On 30.06.2015 14:11, Bastien Nocera wrote:
 
 
 - Original Message -
 On 30.06.2015 13:53, Bastien Nocera wrote:


 - Original Message -
 On 30.06.2015 11:24, Tomas Hozza wrote:
 snip
 It means that the site of your bank you are on may not be provided the
 actual host you should be connected to, but instead by some attacker's.
 The insecure mode means that you are vulnerable in the same way as the
 plain DNS is. So you are insecure even now if you don't use DNSSEC
 without realizing it.

 Except if your bank is using https and you connected to it that way, and
 you have unbroken CA roots. and so on ...

 The combinatorial explosion of states between insecure (someone just
 stole my money) and secure (the NSA be crying because they can't touch
 this) ... means you end up with about  posibilities to explain to
 the user.

 It's not possible to represent all of this in a dialog. We'd have to
 print a book and mail to to the user.

 Which means that it needs to be opt-in for us not to have unbreak my
 Internet
 buttons in the UI. Once DNSSEC is more widely deployed and we can safely
 assume that the majority of the Internet is used it, we can toggle it on.

 Yeah, that's one option.

 Another is if dnssec-trigger can reliably detect the presence of DNSSEC
 on a given network, then it could enforce its use from then on.
 
 The good thing being that NetworkManager knows all that, and that the desktop
 doesn't need to track which network we connected to, and whether or not it
 used DNSSEC.

I would not like GNOME to track anything network related. I think NM is
good place for tracking network configuration. We don't want GNOME to
track anything, but rather to provide UI for tools that are tracking the
state.

 But making the user decide (or showing them a message) every time they
 connect to such networks is not the way to go.
 
 Exactly, cf. which firewall zone is this network in discussions of 
 yesteryear.

I don't think we are interested in such discussion, since we don't think
it is a good idea to expect regular users to do security related decisions.

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza


On 30.06.2015 14:37, Bastien Nocera wrote:
 
 
 - Original Message -
 snip
 No, it is not. It is opt-in now, we want it by default. Please read the
 change. Thank you.
 
 I don't see any options about it in GNOME's Network panel. I'm not interested
 in integration as an after-thought.

This is exactly what this email thread is all about... integration.

 I think it best to stop this dead-end discussion until you've integrated
 DNSSEC support into NetworkManager.

I'm open to discussion. I don't have problem with you not continuing it.

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza
On 30.06.2015 16:07, Michael Catanzaro wrote:
 On Tue, 2015-06-30 at 11:24 +0200, Tomas Hozza wrote:
 The thing is that some information are unrelated to NM. There is no
 reason to push all information back to NetworkManager, since its role 
 is
 explicitly defined - manage network connections and leave the DNS
 resolution and configuration up to different tool.
 
 I'm not sure I agree with that, from a desktop developer perspective.
 It's very convenient for GNOME (and probably also KDE) for
 NetworkManager to be the one-stop shop for network management. It
 already allows you to configure DNS anyway (in GNOME, under Network -
 hidden gear menu in the lower right - IPv4 or IPv6) so there has to be
 some level of integration to keep that working.

This will still work. We are not going to interfere with the
configuration that NM stores. If you configured explicit DNS servers,
dnssec-trigger will still try to use those. However if they don't
support DNSSEC, it will fallback to some other method.

If by configuring DNS you mean writing content into resolv.conf, then NM
will not do that any more. Instead we will use configuration from NM,
including the user defined values. We will test the DNS servers and act
upon the results of tests.

There is a draft of the final configuration based on the network
configuration [1]. Note that we don't care if the DNS servers came from
DHCP or if user specified these manually. We act only on the final
config provided by NM.

[1]
https://fedoraproject.org/w/index.php?title=Networking/NameResolution/DNSSEC/UnboundMixedMode#Usage

Regards,
Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza


On 30.06.2015 16:07, Michael Catanzaro wrote:
 On Tue, 2015-06-30 at 14:23 +0200, Tomas Hozza wrote:
 Except that this is exactly what we DON'T want to do. DNSSEC is an
 extension of DNS and it can be used even without the need for the 
 whole
 Internet to be signed. We want to use it even if the network-provided
 DNS resolvers don't support DNSSEC.
 
 I'm confused on one point: why would the user ever want to turn off
 DNSSEC validation (except to get past a for captive portal)? It sounds
 like you have no shortage of safeguards in place to make sure this
 always works: for it to break the user would have to be on a network
 that doesn't support DNSSEC, that blocks VPN, with the Fedora
 infrastructure down, right? I think it's OK to fail connections in that
 case (provided we have a story for captive portals).
 
 What we basically do not want is to give the user an option for turning
 a security feature off.

Thank you for explanation. In that case we don't need any UI integration
for this. Even though we use dnssec-trigger daily on our machines, we
wanted to give the user a way to disable the feature if needed without
the root access. This is more of a precaution in case something is
broken and we didn't know about it.

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: DNSSEC/unbound - boingboing.net failures

2015-06-30 Thread Tomas Hozza
On 30.06.2015 17:07, Matthew Miller wrote:
 With the DNSSEC feature enabled as per the testing instructions, I'm
 sometimes (but not always) getting failures for popular geek blog Boing
 Boing, when public DNS still works:

   $ host boingboing.net
   Host boingboing.net not found: 2(SERVFAIL)

   $ host boingboing.net 8.8.8.8
   Using domain server:
   Name: 8.8.8.8
   Address: 8.8.8.8#53
   Aliases:

   boingboing.net is an alias for boingboing.net.global.prod.fastly.net.
   boingboing.net.global.prod.fastly.net is an alias for
   global-ssl.fastly.net.
   global-ssl.fastly.net is an alias for fallback.global-ssl.fastly.net.
   fallback.global-ssl.fastly.net has address 199.27.76.249
   fallback.global-ssl.fastly.net has address 23.235.46.249

 What's going on here? How can I diagnose it, and how can we fix it so
 that users don't have to diagnose these situations?

 I'm concerned that if it's happening with this site (which Alexa rates
 as in the top 1000 websites in the US), it'll happen with a lot of
 others.

Hi Matt.

Please file a bug against dnssec-trigger. It will be better for getting 
additional information. Also please see the reply by Paul Wouters to your 
previous email.

Thanks in advance.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Schedule for Wednesday's FESCo Meeting (2015-07-01)

2015-06-30 Thread Tomas Hozza
Following is the list of topics that will be discussed in the FESCo
meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2015-07-01 18:00 UTC'


Links to all tickets below can be found at:
https://fedorahosted.org/fesco/report/9

= Followups =

#topic #1450 F23 System Wide Change: Python 3 as the Default Implementation
.fesco 1450
https://fedorahosted.org/fesco/ticket/1450

#topic #1445 F23 Self Contained Changes
.fesco 1445
https://fedorahosted.org/fesco/ticket/1445

= New business =

#topic #1451 F23 System Wide Change: SELinux policy store migration
.fesco 1451
https://fedorahosted.org/fesco/ticket/1451

#topic #1452 F23 System Wide Change: Two Week Atomic
.fesco 1452
https://fedorahosted.org/fesco/ticket/1452

#topic #1453 F23 System Wide Change: Glibc locale subpackaging
.fesco 1453
https://fedorahosted.org/fesco/ticket/1453

#topic #1454 F23 System Wide Change: Unicode 8.0 support
.fesco 1454
https://fedorahosted.org/fesco/ticket/1454

#topic #1455 F23 System Wide Change: Standardized Passphrase Policy
.fesco 1455
https://fedorahosted.org/fesco/ticket/1455

= Open Floor =

For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at
https://fedorahosted.org/fesco/report/9

If you would like to add something to this agenda, you can reply to
this e-mail, file a new ticket at https://fedorahosted.org/fesco,
e-mail me directly, or bring it up at the end of the meeting, during
the open floor topic. Note that added topics may be deferred until
the following meeting.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: dnssec-trigger + GNOME + NetworkManager integration

2015-06-30 Thread Tomas Hozza
On 26.06.2015 17:13, Matthias Clasen wrote:
 On Tue, 2015-06-23 at 18:43 +0200, Tomas Hozza wrote:
 
 Hey, I was out for a week, so this may be a bit of a late reply.
 
 As Michael and Bastien already stated, all the GNOME networking UI
 relies on information gotten from NetworkManager, and we'd like to keep
 it that way. In particular, NetworkManager has an existing API to
 inform us about captive portals - if at all possible, you should keep
 that working.

Yes, it should work. We didn't change anything related to that. We just
had our own implementation.

 [...]
 
 This boils down to what we need from some new version of the UI that 
 we
 need to be well integrated with GNOME:
 
 1. Be able to inform user about some situations (Captive portal
 detected, network blocks all DNS communication, ...) and enable the 
 user
 to take an action. (This could be possibly done by the notifications
 system in latest GNOME)

 - this may be solved also in GNOME already, and may be OK if done
 technically correctly. Please note my note earlier on NM notifying 
 other
 services when Captive Portal is detected
 
 My perspective on this is that we already have a UI: GNOME shell
 displays network status, including captive portal. If NetworkManager
 needs to add a few more connection states related to DNSSEC, we can
 adapt to that.

The thing is that some information are unrelated to NM. There is no
reason to push all information back to NetworkManager, since its role is
explicitly defined - manage network connections and leave the DNS
resolution and configuration up to different tool.

 GNOME shell also launches a browser when needed for captive portal
 login. If we need to tweak the way the browser is launched to make it
 work on a dnssec-enabled system, that should be possible.

I was not able to determine if you rely on the system's stub resolver.
If that is the case, NM should notify GNOME only after dnssec-trigger
switches to hotspot signon mode.

 2. Possibly have some indicator showing if the system is in Secure 
 or
 Insecure state.

 3. Enable the user to switch between those two states manually
 
 This seems dubious, at best. What does it mean if my system is
 'insecure' ? Will my credit card number be stolen ? Will my system be
 taken over by intruders if I don't disconnect immediately ? Most users
 will have no idea, and have to treat such a switch either as scary,
 don't touch or as the fix the internet button.

It means that the site of your bank you are on may not be provided the
actual host you should be connected to, but instead by some attacker's.
The insecure mode means that you are vulnerable in the same way as the
plain DNS is. So you are insecure even now if you don't use DNSSEC
without realizing it.

 I could see adding information regarding the dnssec status of
 connections to the network panel. For that to happen, the information
 needs to be represented in the nm connection configuration, e.g. in
 NmSettingIP4Config, which already has settings like ignore-auto-dns.

We can determine if the connection provided DNS resolvers are usable for
DNSSEC validation, but that's it. There is no such thing as secure
connection from DNS/DNSSEC point of view. The DNS resolvers for global
name resolution are always taken from the default connection (if these
are able to provide DNSSEC data) or full recursion is used or Fedora
fallback infrastructure is used. Then for VPNs explicit forward zones
are configured, with VPN provided DNS resolvers.

So the bottom line is, that it does not make sense to distinguish
security status of a connection from DNS/DNSSEC point of view, but
rather the security status of the whole system and DNS resolution as a
service provided by the system via stub resolver.

 4. Additionally enable the user to trigger the reprobe of
 connection-provided DNS resolvers and display result of the probe 
 (last
 one).

 - this should not be needed for regular use. It is more of a 
 debugging tool
 
 I would encourage you to ship it separately as such, then. I don't even
 think it needs to be a graphical tool, a commandline utility would be
 just fine for this purpose.

There is already a commandline tool that does all the things the GTK
panel does.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2015-06-24)

2015-06-24 Thread Tomas Hozza
===
#fedora-meeting: FESCO (2015-06-24)
===


Meeting started by thozza at 18:00:02 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting/2015-06-24/fesco.2015-06-24-18.00.log.html
.



Meeting summary
---
* init process  (thozza, 18:00:02)
  * No quorum today. The meting is canceled. See you next week.
(thozza, 18:10:14)

Meeting ended at 18:10:14 UTC.




Action Items






Action Items, by person
---
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* thozza (13)
* nirik (6)
* zodbot (6)
* mstuchli (5)
* mhroncok (5)
* rkuska (4)
* jwb (3)
* jkurik (2)
* mitr (1)
* mgrepl (1)
* sgallagh (0)
* rishi (0)
* paragan (0)
* ajax (0)
* dgilmore (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot


On 23.06.2015 17:43, Tomas Hozza wrote:
 Following is the list of topics that will be discussed in the FESCo
 meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.
 
 To convert UTC to your local time, take a look at
   http://fedoraproject.org/wiki/UTCHowto
 
 or run:
   date -d '2015-06-24 18:00 UTC'
 
 
 Links to all tickets below can be found at:
 https://fedorahosted.org/fesco/report/9
 
 = Followups =
 
 #topic #1450 F23 System Wide Change: Python 3 as the Default Implementation
 .fesco 1450
 https://fedorahosted.org/fesco/ticket/1450
 
 #topic #1445 F23 Self Contained ChangesImplementation
 .fesco 1445
 https://fedorahosted.org/fesco/ticket/1445
 
 = New business =
 
 #topic #1451 F23 System Wide Change: SELinux policy store migration
 .fesco 1451
 https://fedorahosted.org/fesco/ticket/1451
 
 = Open Floor =
 
 For more complete details, please visit each individual ticket.  The
 report of the agenda items can be found at
 https://fedorahosted.org/fesco/report/9
 
 If you would like to add something to this agenda, you can reply to
 this e-mail, file a new ticket at https://fedorahosted.org/fesco,
 e-mail me directly, or bring it up at the end of the meeting, during
 the open floor topic. Note that added topics may be deferred until
 the following meeting.
 
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Schedule for Wednesday's FESCo Meeting (2015-06-24)

2015-06-23 Thread Tomas Hozza
Following is the list of topics that will be discussed in the FESCo
meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2015-06-24 18:00 UTC'


Links to all tickets below can be found at:
https://fedorahosted.org/fesco/report/9

= Followups =

#topic #1450 F23 System Wide Change: Python 3 as the Default Implementation
.fesco 1450
https://fedorahosted.org/fesco/ticket/1450

#topic #1445 F23 Self Contained ChangesImplementation
.fesco 1445
https://fedorahosted.org/fesco/ticket/1445

= New business =

#topic #1451 F23 System Wide Change: SELinux policy store migration
.fesco 1451
https://fedorahosted.org/fesco/ticket/1451

= Open Floor =

For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at
https://fedorahosted.org/fesco/report/9

If you would like to add something to this agenda, you can reply to
this e-mail, file a new ticket at https://fedorahosted.org/fesco,
e-mail me directly, or bring it up at the end of the meeting, during
the open floor topic. Note that added topics may be deferred until
the following meeting.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

dnssec-trigger + GNOME + NetworkManager integration

2015-06-23 Thread Tomas Hozza
://www.nlnetlabs.nl/projects/dnssec-trigger/#screenshots


I'm all for simple and clean integration. Let's identify specific
solutions and pieces we can start working on.

Thanks.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-18 Thread Tomas Hozza


On 18.06.2015 13:14, Bastien Nocera wrote:
 
 
 - Original Message -
 On 12.06.2015 19:00, Matthew Miller wrote:
 On Fri, Jun 12, 2015 at 11:53:32AM -0500, Dan Williams wrote:
 Yeah, we did.  From my recollection, most of that focused on the unbound
 parts and how NM could add the dns=unbound stuff (which Pavel
 contributed) but less on the NM connectivity checking, becuase Fedora
 hadn't turned that on by default yet.  I'm all fine with dns=unbound,
 that's not the issue.  The issue is more around what happens with NM's
 connectivity checking, since that's used by quite a few clients,
 including GNOME Shell.

 I personally find the anchor icon very confusing. As a non-expert in
 this area, it doesn't represent anything which seems relevant to me,
 and all of the right click menu options, once I figured out to right
 click, are obscure to me.

 I plan to contact the GNOME folks about how they would be willing to
 better integrate the panel (most probably in a different form) into GNOME.
 
 I don't think we want to integrate one more panel applet. The information 
 about
 the DNS security should be passed on from NetworkManager. Once that's figured
 out, we can discuss how to show that information.

I think you should discuss with us the approach before saying that you
don't want to integrate with dnssec-trigger. We don't see any reason why
the information should be passed back to NM. The information can be
passed or gathered from dnssec-trigger itself. We don't want to lock
ourselves only to NetworkManager, since there are also other network
configuration managers.

 The code needs to integrate with various NetworkManager features, such as
 VPNs and connectivity checking. Adding any UI for network information provided
 via a side-channel would be premature.

VPNs... done like 2 years ago. From what we discussed the connectivity
checking is not really perfect in NM, since it assumes that DHCP
provided resolvers are in resolv.conf because NM obviously uses system's
stub resolver.

If there are any valid integration pieces, please be specific.

I would love to see more will for cooperation from GNOME people, so we
can converge to the working and well integrated solution. Vague claims
that something is missing or something needs to be done, without clear
reasoning is not helping anyone.

Cheers
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-17 Thread Tomas Hozza
On 17.06.2015 16:22, Paul Wouters wrote:
 On Wed, 17 Jun 2015, Tomas Hozza wrote:

  While I don't actually care, this might well be a sticking point for
  many people since their DNS information is going to an untrusted (to
  them) DNS server.  Yeah, I tend to trust Fedora, but not everyone will.

 If you don't trust fedora infrastructure, you have more issues
 though

  Can the tunnel be turned off, or the broken servers whitelisted, or is
  the answer here to just dnf remove dnssec-trigger?

 Yes. It is all configured in /etc/dnssec-trigger/dnssec-triggerd.conf

  The fallback infrastructure is used as the last resort of DNS data
  source. Full recursion is preferred over the fallback servers.

 And full recursion means your privacy might be in even more danger too
 until the IETF dprive comes up with DNS privacy protocols.

  If someone is trusting a DNS server without using DNSSEC, that that
  person is not really aware of the potential security implications of
  such name resolution. With DNSSEC validation done locally, it is
  irrelevant what DNS servers are uses, as long they can provide all the
  DNSSEC data.

 I think DNS privacy was the issue here, not security. Eg the fact that
 fedora servers see your DNS queries for evil.com. There are no logs kept
 of queries to these servers. I think we would discontinue the service
 before adding logging to them.

  It is not like Fedora infrastructure is collecting data about which user
  is resolving which name. Although ANY DNS service provider can do that!
 
  If user wants to use broken nameservers, they can switch the
  dnssec-trigger to hotspot sign-on mode. I agree that this is
  completely not intuitive and should be rather named insecure mode.
  Practically this means that the DHCP provided resolvers are placed into
  resolv.conf and the user is free to shoot themselves into the feet.

 And your VPN DNS forwards are no longer used, so if you have a VPN up,
 then going into insecure mode means your network behind the VPN
 becomes basically unreachable. The hotspot/insecure mode is not a dont
 trust fedora mode. People should not use that way.

Right, although it would be technically possible to also add VPN
resolvers to resolv.conf in hotspot signon mode it is not the goal of
the mode.

  Also turning off the dnssec-triggerd.service is a solution, since it
  will clean up after itself and return back the system to the original
  state. Of course you can remove it if you wish :)

 But that would affect all users. Granted, we are probably talking
 about private laptops here. But in theory one should disable
 dnssec-trigger-panel on a per-user basis, and not stop the system service.

Right, I meant it for the single-user machine. Disabling the panel will
not turn off the dnssec-trigger itself, so I don't think it would solve
anything other than getting rid of the UI popup windows.

  systemd-resolved plans to do just a kind of best effort DNSSEC, at
  least from what I asked on the Linux PLumbers Conference in Dusseldorf
  last year on the Tom Gundersen's presentation. This means they will do
  the validation, but only if they are able to. They don't plan and don't
  want to do any fallback to external infrastructure, but rather want to
  turn off the validation. I'm not sure if this is still the case, but it
  was. This is exactly what we don't want to do with dnssec-trigger and
  Unbound. We will try really hard to do DNSSEC validation.

 A design that will just turn it off DNSSEC, possibly even silenly,
 seems like the wrong approach. I assume we are misunderstanding the
 systemd-resolvd goals here, and will let the systemd people explain
 their design.

I hope, too. :)

  If this is indeed what you're proposing, then lets have a discussion
  about dnssec-trigger+unbound in that context, I do have some
 thoughts to
  contribute here.
 
  Good, we are open to thoughts and ideas ;)

 Indeed, I'm curious to what others have to say. Clearly, I have a
 somewhat strong bias toward DNSSEC :)

 Paul

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-17 Thread Tomas Hozza
On 12.06.2015 19:17, Paul Wouters wrote:
 On 06/12/2015 12:53 PM, Dan Williams wrote:
 b) Broken networks:
 Some networks are so broken that even without captive portal they are not 
 able
 to deliver DNSSEC data to the clients.

 In that case will try tunnel to other DNS servers on the Internet (Fedora
 Infra or public DNS root) and use them. Naturally, local/internal domains 
 need
 to be available.

 While I don't actually care, this might well be a sticking point for
 many people since their DNS information is going to an untrusted (to
 them) DNS server.  Yeah, I tend to trust Fedora, but not everyone will.
 Can the tunnel be turned off, or the broken servers whitelisted, or is
 the answer here to just dnf remove dnssec-trigger?
 
 The fallbacks are configured in /etc/dnssec-trigger/dnssec-triggerd.conf
 
 # Provided by fedoraproject.org, #fedora-admin
 # It is provided on a best effort basis, with no service guarantee.
 ssl443: 140.211.169.201 
 A8:3E:DA:F0:12:82:55:7E:60:B5:B5:56:F1:66:BB:13:A8:BD:FC:B4:51:41:C0:F2:E7:8E:7B:64:AA:87:E6:F2
 tcp80:  140.211.169.201
 ssl443: 66.35.62.163 
 A8:3E:DA:F0:12:82:55:7E:60:B5:B5:56:F1:66:BB:13:A8:BD:FC:B4:51:41:C0:F2:E7:8E:7B:64:AA:87:E6:F2
 tcp80:  66.35.62.163
 ssl443: 152.19.134.150 
 A8:3E:DA:F0:12:82:55:7E:60:B5:B5:56:F1:66:BB:13:A8:BD:FC:B4:51:41:C0:F2:E7:8E:7B:64:AA:87:E6:F2
 tcp80:  152.19.134.150
 ssl443: 2610:28:3090:3001:dead:beef:cafe:fed9 
 A8:3E:DA:F0:12:82:55:7E:60:B5:B5:56:F1:66:BB:13:A8:BD:FC:B4:51:41:C0:F2:E7:8E:7B:64
 :AA:87:E6:F2
 tcp80:  2610:28:3090:3001:dead:beef:cafe:fed9
 
 Can we integrate on one place (e.g. by calling into dnssec-trigger) instead
 overwriting /etc/resolv.conf independently?

 This is the real issue.  It sounds like What you're proposing is to make
 dnssec-trigger into the DNS broker.  The previous solutions
 (resolvconf, NetworkManager, etc) have all failed for various reasons.
 Touching/changing something so fundamental to the system, as you've
 probably discovered, can be hard...
 
 But it must be done for security reasons.
 
 systemd-resolved might have a chance here, since it's small and pretty
 simple, but they don't have an external API and don't seem interested in
 creating one any time soon which severely limits it's usefulness.
 
 And last I looked it did not support DNSSEC. I'm also weary about 
 systemd-resolved basically marshalling DNS via DBUS.
 
 If this is indeed what you're proposing, then lets have a discussion
 about dnssec-trigger+unbound in that context, I do have some thoughts to
 contribute here.
 
 I believe we selected dnssec-trigger because it was the UI/daemon that 
 worked. A better native integration into either
 NM or Gnome would be preferred.

I had the same idea before, but given that there is not only NM, but
also other projects that intend to do the same thing as NM and even
replace it in some environments (e.g. systemd-networkd) I don't think
it makes sense to implement the same thing in each and every of these.

I changed my mind and think that having one component implementing the
functionality and communicating with the network configuration software
that is used on the specific platform is a better approach. Although
dnssec-trigger may not be ideal as final solution, it is a good for
start and as a proof of concept of how to do client side DNSSEC
validation properly.

Tomas

 Paul
 

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-17 Thread Tomas Hozza
On 12.06.2015 18:58, Dan Williams wrote:
 On Fri, 2015-06-12 at 10:58 +0200, Tomas Hozza wrote:
 On 11.06.2015 22:48, Dan Williams wrote:
 On Tue, 2015-06-09 at 12:30 -0400, Matthew Miller wrote:
 On Tue, Jun 09, 2015 at 11:34:39AM -0400, Paul Wouters wrote:
 decision needs to then be made by the system. I believe that's been
 mostly due to lack of time for the various parties to sit down and
 plan and then program this further.

 We should try to make that happen.

 Unfortunately the Proposal doesn't say anything about how this will
 actually work, which is something NetworkManager needs to know.  It also
 fails to address the failure cases where your local DNS doesn't support
 DNSSEC or is otherwise broken here out of no fault of your own.

 NetworkManager is pure network configuration manager in this scenario.
 We don't expect nor want NM to handle /etc/resolv.conf. We will only get
 the current network configuration from it and act upon it. NM
 configuration will contain dns=unbound.
 
 Correct, and I personally have no problem with this.  NM is quite happy
 to hand off DNS information wherever it has been told to do so.
 
 But this is separate from the connectivity detection/hotspot issue which
 I think we'll discuss more below.
 
 The cases when local (to the network you are connected to) DNS resolver
 does not support DNSSEC is handled by the logic in dnssec-trigger and
 dnssec-trigger script. Unbound is always configured in a way that it is
 able to do DNS resolution and DNSSEC validation. If this can not be
 done, the user is informed.
 
 Right, and that's where most of this discussion lies, I think.
 
 I see that there's a hotspot sign on option if you right click on the
 icon. How does this work with Network Manager and GNOME's captive
 portal detection?
 I have never seen those work except for when the backend was down and
 I got a stream of false positives. But possibly that is because I've used
 dnssec-trigger for years now and it might win the captive portal
 detection race. There are some bugs once in a while but overal it works
 pretty reliably.

 I think that's probably it — the race. The hotspot signon thing works
 for me at coffeeshops. Or it did before I enabled this feature. We'll
 see now!

 So, if you're behind a portal then unbound could potentially fail all
 DNS lookups.  That means that NetworkManager's connectivity detection,
 which relies on retrieving a URL from a known website, will fail because
 the DNS lookup for it was blocked by unbound.  Thus GNOME Shell portal
 detection will also fail.  That kinda sucks.

 If there is such situation, that Unbound fails all DNS lookups, then it
 is a bug. This is pure theory until you have some real situation. The
 logic is designed in a way to prevent such situations from ever happen.
 Hotspot detection is done by dnssec-trigger. The hot-spot-signon is done
 by putting DHCP provided resolvers into resolv.conf. So in this
 situation Unbound it not used at all.

 While I'm sure the dnssec-trigger panel applet works great for some
 people, I think the GNOME team would rather have the portal
 functionality in the existing GNOME Shell indicator.  There is nothing
 wrong with having DNSSEC enabled and part of the portal detection
 scheme, but the UI handling portals is clearly a desktop-specific
 decision.  So whatever we need to do in NM to enable the workflow that
 desktops need is what we'll end up doing...  Ideally the process goes
 like this when unbound/dnssec-trigger are installed:

 1. NM connects to a new network

 1.1. Dispatch dispatcher with the network configuration change event.

 2. NM updates DNS information

 NM is not expected to touch resolv.conf in the intended default
 configuration.
 
 My #2 was intended to be the same as your #1.1.  I was assuming
 dns=unbound here.
 
 3. NM waits for some signal from unbound/dnssec-trigger about the
 trustability of the DNS server

 If you think NM needs to do some action (as I don't), we don't have
 problem with notifying NM (if you provide some API).
 
 NM may need to do some action for connectivity checking.
 
 3a. if the DNS server is trusted, NM continues with its connectivity
 check
 3b. if the DNS server is not trusted or DNSSEC is broken, then ???  How
 do we distinguish between portal and simply that your local DNS
 doesn't support DNSSEC or is otherwise broken, if we cannot resolve the
 address of the connectivity server?

 The only trusted DNS resolver is the local Unbound. The DNS resolver
 from the network you are connected to is never trusted. It is just used
 in case it can provide all the necessary information to do the DNSSEC
 validation. Since using such data we are able to build the chain of
 trust and verify that the Answer is correct, there is no point in
 distinguishing if network provided resolver is trusted or not... it is
 not. This is the reason we do the validation locally.
 
 Ok, I should rephrase my question to be clearer.  NM's connectivity
 checking

Re: Packaging Guidelines for Applications using Git Submodules

2015-06-17 Thread Tomas Hozza
On 13.06.2015 04:33, Gerald B. Cox wrote:
 I'm trying to figure out the best way to handle the situation where a
 project decides to use submodules in Git.  The archive generated doesn't
 incorporate the submodule files.  

 I've done some searching on this, and haven't really come up with much.
 I've reviewed:  Packaging:Github
 https://fedoraproject.org/wiki/Packaging:SourceURL?rd=Packaging/SourceURL#Github
  
 ; but that really doesn't address the submodule issue.

 I looked through some packages that are currently in the Fedora
 repository and found where a few folks have rebuilt the tarball and
 referenced that version as the Source in the spec file; then they put in
 a comment stating:

 The source of this package was pulled from upstreams' vcs.  Use the
 following
 commands to generate the tarball:
 ...
 - git clone
 ...
 - git submodule init
 - git submodule update
 ...

 This approach is the best that I've found.  Any other suggestions?

 Thanks much!

Hi.

I think the approach used in the existing packages ~ to rebuild the
source tarball is a valid solution.

You may want to file a FPC ticket [1] describing the situation, so that
FPC may potentially change the Packaging guidelines to include some note
on git submodules. If you have some proposed draft of the change (e.g.
describing the current approach used in other packages) I think it is a
good idea to include it.

[1] https://fedorahosted.org/fpc/

Regards,
Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-17 Thread Tomas Hozza
On 12.06.2015 16:58, Paul Wouters wrote:
 On Fri, 12 Jun 2015, Matthew Miller wrote:
 
 Another integration concern: the network config GUI (and ifcfg files,
 for that matter) let me list specific DNS servers. With this
 feature, are those used (and if so, how)? If not, is my configuration
 just silently ignored?
 
 I do not know if it is supported currently, but support for that is
 very trivial. If unbound is found running, issue:
 
 unbound-control forward_add . 1.2.3.4 5.6.7.8
 
 I'm not sure whose job that would be.
 
 Paul

This should be ideally left to the network configuration software (e.g.
NM). Dnssec-trigger will not touch any forward zones that are already
configured in Unbound and it didn't configured them itself. While
technically this should not be a problem, and everything should work
properly (since forward zones are configured properly), this should be
ideally done only by the dnssec-trigger based on the information passed
by VPN to the NM.

Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-17 Thread Tomas Hozza
On 12.06.2015 18:53, Dan Williams wrote:
 On Fri, 2015-06-12 at 17:10 +0200, Petr Spacek wrote:
 On Tue, 2015-06-09 at 12:30 -0400, Matthew Miller wrote:
 On Tue, Jun 09, 2015 at 11:34:39AM -0400, Paul Wouters wrote:
 decision needs to then be made by the system. I believe that's been
 mostly due to lack of time for the various parties to sit down and
 plan and then program this further.

 We should try to make that happen.

 Okay, let's start once again from scratch.

 All of this was already discussed and we even had a huge meeting around
 DevConf and FLOCK 2014 about this, so following text will be just a short
 refresher:
 
 Yeah, we did.  From my recollection, most of that focused on the unbound
 parts and how NM could add the dns=unbound stuff (which Pavel
 contributed) but less on the NM connectivity checking, becuase Fedora
 hadn't turned that on by default yet.  I'm all fine with dns=unbound,
 that's not the issue.  The issue is more around what happens with NM's
 connectivity checking, since that's used by quite a few clients,
 including GNOME Shell.
 
 The ultimate goal
 =
 Make various man-in-the-middle attacks *automatically* detectable - without
 any user interaction. Especially we want to get rid of dialogs like Site
 www.gmail.com is using certificate issued for xxx.porn and certificate's
 validity ended 10 years ago. Do you want to continue? [YES] [YES] [YES].


 Tools
 =
 To achieve this goal we need to do DNSSEC validation on every client machine
 (ignoring Docker for a moment, see below) and allow applications to use DNS 
 as
 trusted source of sensitive data (certificate fingerprints, SSH fingerprints,
 etc.).

 DNSSEC allows all parties to publish their fingerprints in DNS and gives us a
 secure way to get the data and to detect that someone prevents us from 
 getting
 the data.


 Longer description
 ==
 http://developerblog.redhat.com/2015/04/14/writing-an-application-that-supports-dnssec-in-rhel-and-fedora/


 First step: DNSSEC validation
 =
 Contemporary networks are full of broken DNS proxies so we need to jump
 through various hoops to get non-faked DNSSEC data for DNSSEC validation.

 The goal of this step is to get *cryptographical* proof that the data we
 received are the same as DNS zone owner published.

 This includes two sub-problems:
 a) Hot-spots:
 Captive portal detection needs to allow user to disable all the security so 
 he
 can log-in but this needs to be done in a secure and reliable way so an
 attacker cannot misuse this.

 b) Broken networks:
 Some networks are so broken that even without captive portal they are not 
 able
 to deliver DNSSEC data to the clients.

 In that case will try tunnel to other DNS servers on the Internet (Fedora
 Infra or public DNS root) and use them. Naturally, local/internal domains 
 need
 to be available.
 
 While I don't actually care, this might well be a sticking point for
 many people since their DNS information is going to an untrusted (to
 them) DNS server.  Yeah, I tend to trust Fedora, but not everyone will.
 Can the tunnel be turned off, or the broken servers whitelisted, or is
 the answer here to just dnf remove dnssec-trigger?

The fallback infrastructure is used as the last resort of DNS data
source. Full recursion is preferred over the fallback servers.

If someone is trusting a DNS server without using DNSSEC, that that
person is not really aware of the potential security implications of
such name resolution. With DNSSEC validation done locally, it is
irrelevant what DNS servers are uses, as long they can provide all the
DNSSEC data.

It is not like Fedora infrastructure is collecting data about which user
is resolving which name. Although ANY DNS service provider can do that!

If user wants to use broken nameservers, they can switch the
dnssec-trigger to hotspot sign-on mode. I agree that this is
completely not intuitive and should be rather named insecure mode.
Practically this means that the DHCP provided resolvers are placed into
resolv.conf and the user is free to shoot themselves into the feet.

Also turning off the dnssec-triggerd.service is a solution, since it
will clean up after itself and return back the system to the original
state. Of course you can remove it if you wish :)

 All these sub-problems (including VPN handling an so on) are solved by
 dnssec-trigger with tweaks by Tomas Hozza and Pavel Simerda.


 HERE we need to coordinate with other parties who might want to write into 
 the
 /etc/resolv.conf file. These include (but might not be limited to):
 NetworkManager
 initscripts
 dhclient
 libreswan ?
 resolved
 connman
 
 pppd, vpnc, openvpn, etc. should get added to the list since they all
 have scripts that can potentially write to /etc/resolv.conf.
 
 Option is either to implement all the checks and workarounds in all the
 projects over and over or to implement all the logic in one place -
 dnssec-trigger

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-17 Thread Tomas Hozza
On 12.06.2015 19:00, Matthew Miller wrote:
 On Fri, Jun 12, 2015 at 11:53:32AM -0500, Dan Williams wrote:
 Yeah, we did.  From my recollection, most of that focused on the unbound
 parts and how NM could add the dns=unbound stuff (which Pavel
 contributed) but less on the NM connectivity checking, becuase Fedora
 hadn't turned that on by default yet.  I'm all fine with dns=unbound,
 that's not the issue.  The issue is more around what happens with NM's
 connectivity checking, since that's used by quite a few clients,
 including GNOME Shell.
 
 I personally find the anchor icon very confusing. As a non-expert in
 this area, it doesn't represent anything which seems relevant to me,
 and all of the right click menu options, once I figured out to right
 click, are obscure to me.

I plan to contact the GNOME folks about how they would be willing to
better integrate the panel (most probably in a different form) into GNOME.

 I understand Hotspot sign-on and can go from there, but I can't see
 it not completely perplexing e.g. my dad.

I agree that something like insecure mode would be more self-explanatory.

 I don't know what Reprobe does (and especially not because there's no
 context other than the anchor), and Probe Results give some
 indication that it has to do with DNSSEC — but I think that if our
 users have to learn what that means and understand all that in order to
 be secure (or just to browse the web at _any_ level), we're not
 succeeding.
 
 I hope we can get a design for this which integrates better with GNOME
 Shell and the existing network icon there.

I hope too.

Regards,
Tomas

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-12 Thread Tomas Hozza
On 11.06.2015 22:48, Dan Williams wrote:
 On Tue, 2015-06-09 at 12:30 -0400, Matthew Miller wrote:
 On Tue, Jun 09, 2015 at 11:34:39AM -0400, Paul Wouters wrote:
 decision needs to then be made by the system. I believe that's been
 mostly due to lack of time for the various parties to sit down and
 plan and then program this further.

 We should try to make that happen.
 
 Unfortunately the Proposal doesn't say anything about how this will
 actually work, which is something NetworkManager needs to know.  It also
 fails to address the failure cases where your local DNS doesn't support
 DNSSEC or is otherwise broken here out of no fault of your own.

NetworkManager is pure network configuration manager in this scenario.
We don't expect nor want NM to handle /etc/resolv.conf. We will only get
the current network configuration from it and act upon it. NM
configuration will contain dns=unbound.

The cases when local (to the network you are connected to) DNS resolver
does not support DNSSEC is handled by the logic in dnssec-trigger and
dnssec-trigger script. Unbound is always configured in a way that it is
able to do DNS resolution and DNSSEC validation. If this can not be
done, the user is informed.

 I see that there's a hotspot sign on option if you right click on the
 icon. How does this work with Network Manager and GNOME's captive
 portal detection?
 I have never seen those work except for when the backend was down and
 I got a stream of false positives. But possibly that is because I've used
 dnssec-trigger for years now and it might win the captive portal
 detection race. There are some bugs once in a while but overal it works
 pretty reliably.

 I think that's probably it — the race. The hotspot signon thing works
 for me at coffeeshops. Or it did before I enabled this feature. We'll
 see now!
 
 So, if you're behind a portal then unbound could potentially fail all
 DNS lookups.  That means that NetworkManager's connectivity detection,
 which relies on retrieving a URL from a known website, will fail because
 the DNS lookup for it was blocked by unbound.  Thus GNOME Shell portal
 detection will also fail.  That kinda sucks.

If there is such situation, that Unbound fails all DNS lookups, then it
is a bug. This is pure theory until you have some real situation. The
logic is designed in a way to prevent such situations from ever happen.
Hotspot detection is done by dnssec-trigger. The hot-spot-signon is done
by putting DHCP provided resolvers into resolv.conf. So in this
situation Unbound it not used at all.

 While I'm sure the dnssec-trigger panel applet works great for some
 people, I think the GNOME team would rather have the portal
 functionality in the existing GNOME Shell indicator.  There is nothing
 wrong with having DNSSEC enabled and part of the portal detection
 scheme, but the UI handling portals is clearly a desktop-specific
 decision.  So whatever we need to do in NM to enable the workflow that
 desktops need is what we'll end up doing...  Ideally the process goes
 like this when unbound/dnssec-trigger are installed:
 
 1. NM connects to a new network

1.1. Dispatch dispatcher with the network configuration change event.

 2. NM updates DNS information

NM is not expected to touch resolv.conf in the intended default
configuration.

 3. NM waits for some signal from unbound/dnssec-trigger about the
 trustability of the DNS server

If you think NM needs to do some action (as I don't), we don't have
problem with notifying NM (if you provide some API).

 3a. if the DNS server is trusted, NM continues with its connectivity
 check
 3b. if the DNS server is not trusted or DNSSEC is broken, then ???  How
 do we distinguish between portal and simply that your local DNS
 doesn't support DNSSEC or is otherwise broken, if we cannot resolve the
 address of the connectivity server?

The only trusted DNS resolver is the local Unbound. The DNS resolver
from the network you are connected to is never trusted. It is just used
in case it can provide all the necessary information to do the DNSSEC
validation. Since using such data we are able to build the chain of
trust and verify that the Answer is correct, there is no point in
distinguishing if network provided resolver is trusted or not... it is
not. This is the reason we do the validation locally.


 Dan
 


I would like to add that this already works without any other
interaction with NM. I agree that the notifications from dnssec-trigger
are not ideal. I'm going to contact some GNOME guys and ask them for help.

Thank you for your comments!

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: New ABRT CLI

2015-06-03 Thread Tomas Hozza
On 06/02/2015 03:45 PM, Richard Marko wrote:
 Hi,

 over last two weeks I completely rewrote abrt-cli to make life easier
 for users and developers.

 It now supports tab completion and few new commands like abrt gdb and
 abrt debuginfo-install. Without any arguments these commands will use
 the last crash that occurred on your system.

 New cli is available in abrt-cli-ng subpackage and will replace old
 abrt-cli command in the future.

 Please help with testing according to instructions in the following copr:
 https://copr.fedoraproject.org/coprs/rmarko/abrt/

 Feedback is highly appreciated.

 Thanks!


One small thing. The install instructions are not completely correct.

# dnf --disablerepo=* --enablerepo=rmarko-abrt install abrt-cli-ng
Last metadata expiration check performed 0:00:16 ago on Wed Jun  3
08:02:55 2015.
Error: nothing provides python-argcomplete needed by
abrt-cli-ng-2.5.1-3.fc22.1.x86_64

So this needs to be installed without the --disablerepo=* argument.

Tomas

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-02 Thread Tomas Hozza
On 06/02/2015 06:44 PM, Paul Wouters wrote:
 On Tue, 2 Jun 2015, David Howells wrote:

 Install a local DNS resolver trusted for the DNSSEC validation
 running on
 127.0.0.1:53. This must be the only name server entry in
 /etc/resolv.conf.

 The automatic name server entries received via dhcp/vpn/wireless
 configurations should be stored separately (e.g. this is stored in the
 NetworkManager internal state), as transitory name servers to be
 used by the
 trusted local resolver. In all cases, DNSSEC validation will be done
 locally.

 How does this interact with dnsmasq which also wants to be the only name
 server entry in resolv.conf?
dnsmasq is not the default entry in /etc/resolv.conf. It can be used
with NM, but unbound can be, too. dnsmasq was integrated with NM sooner,
since it didn't have DNSSEC support, which made a lot of corner cases
and issues basically non-existing.

Unbound it relatively simple and single purpose DNS resolver that was
designed with DNSSEC in mind from the beginning... in comparison to
dnsmasq. dnsmasq is a Swiss knife that is good for simple solutions
hacked together with single component (since it supports DHCPv4/6, TFPT
and also DNS+DNSSEC).

 Not well? The problem is dnsmasq is not as feature complete as unbound
 (and its dnssec implementation is very new).
I agree, and as a previous maintainer of dnsmasq, I think unbound is
better option. Although dnsmasq has a simple DBus API, it is mostly for
DHCP. Also unbound has modular design and easy interface
(unbound-control) enabling to reconfigure it dynamically.
 I think most people end up running dnsmasq because of KVM/libvirtd ? I
 think those dnsmasq's should be run in dhcp only mode and point to
 the hosts's unbound.
Right. dnsmasq run by libvirtd uses the default configuration WRT
resolv.conf. So it uses the servers from resolv.conf for resolution -
which will be unbound. There are not conflicts between unbound running
as local resolver and dnsmasq instances run by libvirtd.

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F23 System Wide Change: Default Local DNS Resolver

2015-06-01 Thread Tomas Hozza



On 06/01/2015 03:32 PM, Matthew Miller wrote:
 On Mon, Jun 01, 2015 at 08:03:27AM -0400, Jan Kurik wrote:
 People use Fedora on portable/mobile devices which are connected to
 diverse networks as and when required. The automatic DNS
 configurations provided by these networks are never trustworthy for
 DNSSEC validation. As currently there is no way to establish such
 trust.
 Is this proposal meant to apply to Cloud and Server as well? With
 Cloud, it's at least conventional to assume that the network
 infrastructure provided by the provider is trustworthy (see
 cloud-init). And Server presumably will not be running on
 portable/mobile devices connecting to arbitrary networks. For Server,
 there may be other advantages, but do we also want these for Cloud?
As you can read in the Change proposal, this is part of the scope:
discuss with WGs in which products the change makes sense and
what are the expectations of WGs for different Fedora products

Yes, we think the change makes sense for Server. It is still
beneficial from the security point of view to do the DNSSEC
validation on Server. Even though the configuration on Server
will be static, dnssec-trigger + unbound can be used for this.
Otherwise it would require manual configuration from the
administrator, to enable DNSSEC validation.

As for the Cloud, we are not sure. Maybe it makes sense on
the Atomic Host, but we want to discuss this with people
involved in the Cloud product(s).
 I'm also concerned about going forward with this without having a solid
 answer to the container problem.

This is also one of the scopes:
resolve interoperability issues for Docker and other containers use-cases

PJP is looking at this.

This is work in progress. We will not enable the change in products
and environments in which it will turn out that it does not make sense.

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Deprecation of ISC's DLV registry

2015-05-20 Thread Tomas Hozza
Hi all.

I received a heads-up from ISC that they are planning to deprecate their
DLV registry (https://dlv.isc.org/) in the future.

The use of ISC's DLV repository should be removed from any default configuration
to prevent any issues in the future. I'm aware only about BIND and Unbound 
servers
that use ISC's DLV in their default configuration in Fedora.

If you are aware of any other component, please file a bug and add it to the
tracking bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1223360

Thanks!

Regards,
Tomas
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2015-03-11)

2015-03-11 Thread Tomas Hozza
On 03/10/2015 04:06 PM, Tomas Hozza wrote:
 Following is the list of topics that will be discussed in the FESCo
 meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

 To convert UTC to your local time, take a look at
   http://fedoraproject.org/wiki/UTCHowto

 or run:
   date -d '2015-03-11 18:00 UTC'


 Links to all tickets below can be found at:
 https://fedorahosted.org/fesco/report/9

 = Followups =

 #topic #1412 anaconda password change is causing consternation among the user
 community please review this policy decision
 .fesco 1412
 https://fedorahosted.org/fesco/ticket/1412

 = New business =

 #topic #1420 policy change: admins (non-POC) should be able to retire packages
 .fesco 1420
 https://fedorahosted.org/fesco/ticket/1420

 #topic #1421 FESCO Decision on COPR/Playground in GNOME Software
 .fesco 1421
 https://fedorahosted.org/fesco/ticket/1421

 = Open Floor =

 For more complete details, please visit each individual ticket.  The
 report of the agenda items can be found at
 https://fedorahosted.org/fesco/report/9

 If you would like to add something to this agenda, you can reply to
 this e-mail, file a new ticket at https://fedorahosted.org/fesco,
 e-mail me directly, or bring it up at the end of the meeting, during
 the open floor topic. Note that added topics may be deferred until
 the following meeting.


===
#fedora-meeting: FESCO (2015-03-11)
===


Meeting started by thozza at 18:01:28 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting/2015-03-11/fesco.2015-03-11-18.01.log.html
.



Meeting summary
---
* init process  (thozza, 18:01:28)

* #1412 anaconda password change is causing consternation among the user
  community please review this policy decision  (thozza, 18:03:37)
  * LINK: http://pkgs.fedoraproject.org/cgit/anaconda.git/log/?h=f22 has
last commit 7 days ago  (mitr, 18:08:11)
  * ACTION: thozza to file a beta blocker bug for anaconda to get back
to double-click for weak passwords  (thozza, 18:12:39)
  * the proposal in the ticket is outdated since the alpha is already
out. The change should go into beta.  (thozza, 18:12:56)
  * ACTION: nirik to start a wiki page for discussion around the overall
password policy  (thozza, 18:15:36)

* #1420 policy change: admins (non-POC) should be able to retire
  packages  (thozza, 18:16:07)
  * AGREED: Allow also package admins to retire the package (+7, 0, -1)
(thozza, 18:17:45)

* #1421 FESCO Decision on COPR/Playground in GNOME Software  (thozza,
  18:18:07)
  * AGREED: FESCo agrees with changes proposed in
https://fedorahosted.org/fesco/ticket/1421#comment:0 (+7, 0, -1)
(thozza, 18:44:34)

* Next week's chair  (thozza, 18:44:50)
  * ACTION: sgallagh to update the Third_Party_Repos wiki page
(sgallagh, 18:47:26)
  * nirik to chair next week's meeting  (thozza, 18:47:43)

* Open Floor  (thozza, 18:47:52)
  * Password policy wiki page started at
https://fedoraproject.org/wiki/User:Kevin/Draft_Passwordpolicy
(thozza, 18:51:07)

Meeting ended at 18:58:43 UTC.




Action Items

* thozza to file a beta blocker bug for anaconda to get back to
  double-click for weak passwords
* nirik to start a wiki page for discussion around the overall password
  policy
* sgallagh to update the Third_Party_Repos wiki page




Action Items, by person
---
* nirik
  * nirik to start a wiki page for discussion around the overall
password policy
* sgallagh
  * sgallagh to update the Third_Party_Repos wiki page
* thozza
  * thozza to file a beta blocker bug for anaconda to get back to
double-click for weak passwords
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* thozza (66)
* nirik (53)
* sgallagh (45)
* jwb (33)
* mitr (21)
* dgilmore (11)
* ajax (8)
* zodbot (7)
* t8m (5)
* Cydrobolt (3)
* paragan (2)
* rishi (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Schedule for Wednesday's FESCo Meeting (2015-03-11)

2015-03-10 Thread Tomas Hozza
Following is the list of topics that will be discussed in the FESCo
meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2015-03-11 18:00 UTC'


Links to all tickets below can be found at:
https://fedorahosted.org/fesco/report/9

= Followups =

#topic #1412 anaconda password change is causing consternation among the user
community please review this policy decision
.fesco 1412
https://fedorahosted.org/fesco/ticket/1412

= New business =

#topic #1420 policy change: admins (non-POC) should be able to retire packages
.fesco 1420
https://fedorahosted.org/fesco/ticket/1420

#topic #1421 FESCO Decision on COPR/Playground in GNOME Software
.fesco 1421
https://fedorahosted.org/fesco/ticket/1421

= Open Floor =

For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at
https://fedorahosted.org/fesco/report/9

If you would like to add something to this agenda, you can reply to
this e-mail, file a new ticket at https://fedorahosted.org/fesco,
e-mail me directly, or bring it up at the end of the meeting, during
the open floor topic. Note that added topics may be deferred until
the following meeting.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: FESCo elections are open

2015-02-02 Thread Tomas Hozza
On 02/01/2015 10:39 AM, Alec Leamas wrote:
 On 30/01/15 16:10, Kevin Fenzi wrote:
  On Fri, 30 Jan 2015 15:58:00 +0100
  Alec Leamas leamas.a...@gmail.com wrote:

  There were not really any questions directly related to products.
  Perhaps some could be added next time?
 
  In any case, I am in the Server working group myself, feel free to ask
  the other candidates.
 

 Fair enough. So, a  question  to all candidates: how are you related to the
 different products?
Personally I'm not a member of any WG. However I maintain mostly server-related 
daemons, but not only...

Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F22 System Wide Change: Enable Polyinstantiated /tmp and /var/tmp directories by default

2015-01-20 Thread Tomas Hozza
On 01/20/2015 01:08 PM, Tom Hughes wrote:
 On 20/01/15 11:53, Jaroslav Reznik wrote:

  * Other developers:
  ** Add /tmp-inst and /var/tmp/tmp-inst to filesystem. (packagename: 
  filesystem)
  ** Enable namespaces in /etc/security/namespace.conf (packagename: PAM)
  ** Enable proper selinux context and polyinstantiation_enabled boolean to be
  set (packagename: selinux-policy-targeted or selinux-policy)

 So this effectively reverses tmp-on-tmpfs for users other than root and adm
 right? Because /tmp will actually be a subdirectory of /tmp-inst which will 
 be a
 real directory?

Why do you think this? I don't see any reason why the new tmp-inst directories 
can
not be on tmpfs...
 Incidentally, why /tmp-inst but /var/tmp/tmp-inst? Why not /tmp/tmp-inst for
 /tmp or /var/tmp-inst for /var/tmp? Shouldn't the naming be consistent?

 Tom

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F22 System Wide Change: Default Local DNS Resolver

2015-01-19 Thread Tomas Hozza
On 01/19/2015 06:16 PM, Pete Zaitcev wrote:
 On Wed, 14 Jan 2015 06:26:49 +1030
 William B will...@firstyear.id.au wrote:

  Right now, enabled unbound and dnssec-trigger on a laptop is an
  extremely difficult experience.

 Can you tell why you're trying that. Everyone I talk to always
 go unbound, unbound, unbound... WHY? Unbound is plain broken
 and does not work, especially with DNSSEC. But I use plain
 dnsmasq with NM, and everything works perfectly and fully automated
 by NM on my F21 laptop -- including VPN (with vpnc, no less), my internal
 LAN DNS, airports, office. Perhaps that's only because dnsmasq fails
 to participate in DNSSEC properly? Or what? Why is everyone so
 fixated on Unbound?

 -- Pete


Unbound is designed to do one thing and do it right. To be used
on client as default local resolver it needs something to configure
it ~ dnssec-trigger. (e.g. dnsmasq is directly configured by NM)

Unbound + dnssec-trigger + NM works just fine. Also with split DNS
configuration. I use it every day at home, at work, with VPN. It
works.

I'm not saying there are any use-cases where it breaks, but those need
to be identified and solved. Writing non-technical complains with
zero information for developer in it will get us nowhere.

People want to use unbound, because it does DNSSEC validation.
dnsmasq had no DNSSEC implementation at the time there was already
unbound and dnssec-trigger.

If you use any resolver without DNSSEC the overall situation is
a lot simpler. DNSSEC simply does not work with all the hacks
people were doing with DNS before.

As for unbound vs. dnsmasq... unbound does one thing - DNS validating
resolver. While dnsmasq does almost everything (DNS resolver, validating
resolver, DNS authoritative server, DHCPv4/DHCPv6 server, TFTP server)
and has tons of hackish options. From this point of view, the choice
is pretty clear I think.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F22 System Wide Change: Default Local DNS Resolver

2015-01-19 Thread Tomas Hozza
On 01/13/2015 08:56 PM, William B wrote:
 To install a local DNS resolver trusted for the DNSSEC validation
 running on 127.0.0.1:53. This must be the only name server entry
 in /etc/resolv.conf.
 
  snip ...
 
 People use Fedora on portable/mobile devices which are connected to
 diverse networks as and when required. The automatic DNS
 configurations provided by these networks are never trustworthy for
 DNSSEC validation. As currently there is no way to establish such
 trust.
 
 
 I have a number of concerns about the readiness of the proposal.
 
 Right now, enabled unbound and dnssec-trigger on a laptop is an
 extremely difficult experience. I have since taking up this challenge
 found that turn it off and on again, has become the default solution on
 my linux install now as a result of these problems.

Personally I have completely different experience. I have unbound and 
dnssec-trigger
on by default and it works at home, on WiFi, at work, with VPN...

 For example, crashes in unbound that are not caught in abrt, forwarders
 that do not get added (but they display in the list), queries that
 don't ever get replies (But they work when you by-pass unbound to your
 glibc forwarder), inability to flush dnscache without sudo, and that
 dns caches are held over network boundaries to name a few of my
 concerns.

Did you file an issue to ABRT (or anywhere?)

As for the cache, are you able to do that with dnsmasq? Without sudo you
can't even change /etc/resolv.conf. I think we disagree on what should
non-privileged user should be allowed to do.

 As a result, at this time, enabling this on your system is actually
 more of a deteriment that the benefit being touted. I would prefer
 working DNS over non working secure dns. (I guess it's secure because
 I can send any traffic out).

Yes, without DNSSEC all the hackish network setups just work.

 Apart from trust, these name servers are often known to be flaky and 
 unreliable. Which only adds to the overall bad and at times even
 frustrating user experience. In such a situation, having a trusted
 local DNS resolver not only makes sense but is in fact badly needed.
 It has become a need of the hour. (See: [1], [2], [3])
 
 Unbound creates more flakiness than it solves. Unbound caches no
 answer as a negative cache entry. If your wireless blips for an
 instant, that's it, result vanishes.
 
 
 I think that there should be a large amount of QA focus on this change. 
 Configurations involving split-view dns should be involved in testing,
 testing stability of unbound between suspend/resume, or even
 NetworkManager restarts, testing that quieries resolve in esoteric
 networks (IE networks that capture and redirect DNS traffic).

We will be more than happy to receive any test cases and use-cases (with
steps to setup) and use them for testing the readiness of the Change.

However more than a relatively non-technical discussion about unclear
use-cases that we are unable to reproduce due to insufficient information,
we would welcome clear descriptions and clear statements describing
what specifically is not working as it should.

 This is a change, that currently, has the potential to seriously damage
 the user experience of anyone using fedora. I think that much more
 rigorous testing and thought should go into this before we just steam
 ahead. If in it's current state you install unbound, you will begin to
 notice little issues quickly, especially on laptops. That is not a
 defalt we should aim for.

We are willing to work on resolving user issues. If the change will be
proven not ready, we are ready to work on issues and deffer it to F23.

However from the past experience there is no way everyone will be happy
with the changes, regardless of what those changes are.

 NOTE: I'm not just raging here, I actually have opened BZ's for these
 issues that I have. I think that awareness of these issues is low, and
 that it should be brought to light. I hope that more thorough testing
 is carried out in a wider set of environments to eventually get this to
 a point where it's a seamless change to enable this service. However at
 this time, that is not the case.

We are thankful for your contributions in testing the setup. Hopefully
you recognize some of the improvements done based on your reports.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Bodhi policy for pushing updates to stable

2015-01-16 Thread Tomas Hozza
On 01/15/2015 05:15 PM, Luke Macken wrote:
 On Thu, Jan 15, 2015 at 10:19:19AM +0100, Tomas Hozza wrote:
  Hi all.
 
  When upgrading F20 to F21 using FedUp, some users had a problem
  with some packages not being upgraded (e.g. [1]). The problem was
  caused by broken update path F20 - F21.
 
  For example in wget's case I pushed updates for the same NVR in F20
  and F21 with auto-karma. However the wget update for F20 got the
  stable karma and was pushed to stable before the update for F21.
 
  I think bodhi should enforce the update path is not broken and
  hold the update for F20 until the update for F21 is in stable.
  I know I can do it manually and disable auto-karma and push updates
  to stable as they should be. However I think such task should be
  automated.
 
  Would it be possible to enforce such a thing for updates in bodhi?

 The broken upgrade path for the F20 wget update was detected by
 Taskotron[0], and then bodhi immediately disabled autokarma[1]. However,
 the stable karma threshold was reached about 5 minutes before it was
 detected, so it went out anyway.

 Bodhi2 already has Taskotron-based gating baked into the push
 process[2], but this specific issue can also be fixed in the current
 bodhi1 codebase. Upon Taskotron failure, if the update has already
 reached the stable karma threshold, bodhi should revoke the stable
 request. I opened an upstream ticket to track this issue[3]

 luke

 [0]: 
 https://admin.fedoraproject.org/updates/FEDORA-2014-17194/wget-1.16.1-2.fc20
 [1]: https://fedorahosted.org/fesco/ticket/1242 
 https://github.com/fedora-infra/bodhi/pull/41
 [2]: https://github.com/fedora-infra/bodhi/pull/109
 [3]: https://github.com/fedora-infra/bodhi/issues/116



Thank you for creating the ticket.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

BIND 9.10 in rawhide

2015-01-15 Thread Tomas Hozza
Hi all.

I updated BIND to the latest stable 9.10 version in rawhide,
as discussed here [1]. Feel free to try it out.

[1] https://fedoraproject.org/wiki/Changes/BIND_9.10

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Bodhi policy for pushing updates to stable

2015-01-15 Thread Tomas Hozza
Hi all.

When upgrading F20 to F21 using FedUp, some users had a problem
with some packages not being upgraded (e.g. [1]). The problem was
caused by broken update path F20 - F21.

For example in wget's case I pushed updates for the same NVR in F20
and F21 with auto-karma. However the wget update for F20 got the
stable karma and was pushed to stable before the update for F21.

I think bodhi should enforce the update path is not broken and
hold the update for F20 until the update for F21 is in stable.
I know I can do it manually and disable auto-karma and push updates
to stable as they should be. However I think such task should be
automated.

Would it be possible to enforce such a thing for updates in bodhi?

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1176403

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2014-12-10)

2014-12-10 Thread Tomas Hozza
On 12/09/2014 07:22 PM, Tomas Hozza wrote:
 Following is the list of topics that will be discussed in the FESCo
 meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

 To convert UTC to your local time, take a look at
   http://fedoraproject.org/wiki/UTCHowto

 or run:
   date -d '2014-12-10 18:00 UTC'


 Links to all tickets below can be found at:
 https://fedorahosted.org/fesco/report/9

 = Followups =

 #topic #1349 Fedora 22 scheduling strategy (and beyond)
 .fesco 1349
 https://fedorahosted.org/fesco/ticket/1349

 = New business =

 #topic #1370 requesting exception for linking include-what-you-use with 
 llvm-static
 .fesco 1370
 https://fedorahosted.org/fesco/ticket/1370

 #topic #1371 Nonresponsive maintainer: clockfor
 .fesco 1371
 https://fedorahosted.org/fesco/ticket/1371

 = Open Floor =

 For more complete details, please visit each individual ticket.  The
 report of the agenda items can be found at
 https://fedorahosted.org/fesco/report/9

 If you would like to add something to this agenda, you can reply to
 this e-mail, file a new ticket at https://fedorahosted.org/fesco,
 e-mail me directly, or bring it up at the end of the meeting, during
 the open floor topic. Note that added topics may be deferred until
 the following meeting.

===
#fedora-meeting: FESCO (2014-12-10)
===


Meeting started by thozza at 18:00:43 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting/2014-12-10/fesco.2014-12-10-18.00.log.html
.



Meeting summary
---
* init process  (thozza, 18:00:44)

* init process  (thozza, 18:01:17)

* #1349 Fedora 22 scheduling strategy (and beyond)  (thozza, 18:07:31)
  * AGREED: Postpone the ticket to next week's meeting since mattdm
can't attend today's meeting (+6, 0, -0)  (thozza, 18:12:07)

* #1370 requesting exception for linking include-what-you-use with
  llvm-static  (thozza, 18:12:18)
  * AGREED: close and ask them to talk to FPC? (+5, 0, -0)  (thozza,
18:18:35)

* #1371 Nonresponsive maintainer: clockfor  (thozza, 18:18:43)
  * AGREED: Reassign python-pyudev to dshea (+5, 0, -0)  (thozza,
18:20:51)

* Next week's chair  (thozza, 18:21:12)
  * nirik to chair next week's meeting  (thozza, 18:23:04)

* Open Floor  (thozza, 18:23:14)
  * FESCo thanks everyone for great Fedora 21 release!  (thozza,
18:24:08)

Meeting ended at 18:26:43 UTC.




Action Items






Action Items, by person
---
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* thozza (40)
* nirik (9)
* zodbot (8)
* mattdm (7)
* kalev (7)
* sgallagh (6)
* t8m (5)
* jwboyer (3)
* dgilmore (1)
* mmaslano (0)
* mitr (0)
* stickster (0)
* jwb (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Schedule for Wednesday's FESCo Meeting (2014-12-10)

2014-12-09 Thread Tomas Hozza
Following is the list of topics that will be discussed in the FESCo
meeting Wednesday at 18:00UTC in #fedora-meeting on irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '2014-12-10 18:00 UTC'


Links to all tickets below can be found at:
https://fedorahosted.org/fesco/report/9

= Followups =

#topic #1349 Fedora 22 scheduling strategy (and beyond)
.fesco 1349
https://fedorahosted.org/fesco/ticket/1349

= New business =

#topic #1370 requesting exception for linking include-what-you-use with 
llvm-static
.fesco 1370
https://fedorahosted.org/fesco/ticket/1370

#topic #1371 Nonresponsive maintainer: clockfor
.fesco 1371
https://fedorahosted.org/fesco/ticket/1371

= Open Floor =

For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at
https://fedorahosted.org/fesco/report/9

If you would like to add something to this agenda, you can reply to
this e-mail, file a new ticket at https://fedorahosted.org/fesco,
e-mail me directly, or bring it up at the end of the meeting, during
the open floor topic. Note that added topics may be deferred until
the following meeting.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Abotu setting 'PermitRootLogin=no' in sshd_config

2014-11-21 Thread Tomas Hozza
On 11/21/2014 09:04 AM, P J P wrote:
 On Friday, 21 November 2014 1:24 PM, Florian Weimer wrote:
 
 On 11/21/2014 08:34 AM, Jan Kratochvil wrote:
 Almost all of my Fedora installations are test VMs where
 any security is irrelevant.
 
Okay. But does enabling root login offer any significant benefit in that? 
 IOW, if it's disabled by default, would it cause any significant 
 inconvenience/troubles?? If not, it better be disabled by default.

For example for me it would be some inconvenience. I also use a lot of Fedora
VMs for
testing and none of them has regular user, just root.

However I can see the benefits of disabling root login by default. Especially
from the security point of view. I think it would be a good move.

Regards,
Tomas

 I think it's a valid use case, but rather poorly supported at the 
 moment.  For example, there should be completely seemless SSH login from 
 virt-manager for user-manageable  virtual machines (both as root and the 
 user).

 My point is that once we address this (most likely through some 
 configuration generation during VM setup), we can also switch 
 PermitRootLogin on.
 
 
   You mean off? Or that we disable it by default and enable it while setting 
 up a new VM?
 
 ---
 Regards
-Prasad
 http://feedmug.com
 
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Summary/Minutes from today's FESCo Meeting (2014-11-19)

2014-11-20 Thread Tomas Hozza
On 11/20/2014 08:05 AM, Till Maas wrote:
 On Wed, Nov 19, 2014 at 03:06:11PM -0500, Tomas Mraz wrote:

  * #1368 How to deal with F21 broken dependencies  (t8m, 19:08:56)
* AGREED: FESCo agrees to dropping the packages with broken
  dependencies listed in #1368 from both F21 and rawhide (+7, -0, 0:0)
  (t8m, 19:25:56)

 I retired the packages now. To make sure the final repo does not
 contain any packages with broken dependencies, the Freeze Exception
 process needs to be used to get packages from updates-testing that do
 not contain broken dependencies into the stable repo:
 https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process

* AGREED: We will do the broken deps cleanup on Final Freeze from now
  on in the future Fedora releases (+8, -0, 0:0)  (t8m, 19:30:41)
* There will be warning sent to the affected maintainers at least 3
  weeks in advance  (t8m, 19:31:36)

 What happens with packages that get broken after the warning but before
 the Final Freeze?

 Regards
 Till

Please someone correct me if I'm wrong, but all broken packages
should be cleaned up after the Final Freeze. However we could
send one more up-to-date reminder after the Freeze.

Regards,
Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Idea: Ability to define dependencies between coprs (correctly)

2014-10-09 Thread Tomas Hozza
On 10/02/2014 05:48 PM, Honza Horak wrote:
 On 10/02/2014 05:18 PM, Pierre-Yves Chibon wrote:
 On Thu, Oct 02, 2014 at 05:00:40PM +0200, Honza Horak wrote:
 Problem:
 Currently, copr allows to add a link to an arbitrary repo URL that is
 available for installing dependencies during building in copr. Using this
 dependent repo link we are able to build packages in coprA with dependencies
 in another coprB.

 However, when enabling only coprA and installing some packages from this
 copr, we can miss some packages from coprB, because those packages are not
 available since coprB is not enabled.

 Solution:
 We should be able to define dependency between coprs correctly. When
 creating coprA, we would add one or more depended coprs ('userB/coprB')
 instead of repo link. Then all packages from these coprs would be available
 during build, correct buildroots would be used (no need to specify variables
 $releasever and in addition, we would be able to provide correct (all) RPMs
 also when *installing* coprs.

 There are basically two ways how to implement this on the users' side:
 1) Simpler, preferred by Mirek, copr maintainer (CC'd):
 'copr' plugin in dnf would include -r option, which would basically
 installed all related coprs. That means when running `dnf copr enable -r
 userA/coprA`, user would end with two coprs enabled: userA/coprA and
 userB/coprB.

 2) More complicated, preferred by me :) :
 copr A repository from example above would not only include RPMs build as
 part of this copr, but would include also packages from copr B. That means
 that when running `dnf copr enable userA/coprA`, user would not need to
 install userB/coprB repository and would have all packages available.

 Both ways struggle with refreshing data:
 * in 1) we might need to refresh coprs enabled (on the users' side)
 * in 2) we would need to re-create repodata in depended coprA if coprB gets
 changed (on the server's side).

 What about putting the definition of the coprA on the coprB, ie at:
 https://copr.fedoraproject.org/coprs/pingou/subsurface/repo/fedora-19/pingou-subsurface-fedora-19.repo

 include the definition of the repo this copr depends on (ok bad example for 
 this
 specific copr).

 This way, it's rather clear to the user that the packages are coming from two
 distinct copr, there no need to change dnf and we don't mix up in one repo
 packages potentially built by different people.

 That does imply that existing .repo file might have to be updated.
 
 Yeah, I like that idea, that would remove some obstacles mentioned for 
 solution
 1) above. I'm not sure though if the depended coprs can be called the same as
 the original (we would have two similar repos enabled) or we would have to 
 call
 them differently. Just quick test does not show any issues with more repos 
 with
 the same name.
 
 Honza

Different repos inside a single repo file will be still shown as different
repos when installing a packages from them. Therefore should not cause any 
problems.

However in thins case it might be worth deciding if such .repo should be named
in a way to express it contains also a bundle of dependent repos.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Idea: Ability to define dependencies between coprs (correctly)

2014-10-08 Thread Tomas Hozza
On 10/03/2014 08:24 AM, Bohuslav Kabrda wrote:
 - Original Message -
  Hi all,
 
  I have a proposal that would change how dependencies are defined in copr:
 
  Problem:
  Currently, copr allows to add a link to an arbitrary repo URL that is
  available for installing dependencies during building in copr. Using
  this dependent repo link we are able to build packages in coprA with
  dependencies in another coprB.
 
  However, when enabling only coprA and installing some packages from this
  copr, we can miss some packages from coprB, because those packages are
  not available since coprB is not enabled.
 
  Solution:
  We should be able to define dependency between coprs correctly. When
  creating coprA, we would add one or more depended coprs ('userB/coprB')
  instead of repo link. Then all packages from these coprs would be
  available during build, correct buildroots would be used (no need to
  specify variables $releasever and in addition, we would be able to
  provide correct (all) RPMs also when *installing* coprs.
 
  There are basically two ways how to implement this on the users' side:
  1) Simpler, preferred by Mirek, copr maintainer (CC'd):
  'copr' plugin in dnf would include -r option, which would basically
  installed all related coprs. That means when running `dnf copr enable -r
  userA/coprA`, user would end with two coprs enabled: userA/coprA and
  userB/coprB.
 
  2) More complicated, preferred by me :) :
  copr A repository from example above would not only include RPMs build
  as part of this copr, but would include also packages from copr B. That
  means that when running `dnf copr enable userA/coprA`, user would not
  need to install userB/coprB repository and would have all packages
  available.

 3) (And I think that I've already heard this idea from someone) I think it'd 
 be better to:
 - Put the copr repofiles into RPMs and put all these RPMs in a single repo.
 - These repofile RPMs can depend on each other.
 - dnf copr enable installs an RPM from this repo.
 - When a dependency between repos change, repofile RPMs will be updated. When 
 user runs dnf update, he will get the new repofile RPM build, which will 
 have dependencies changed properly - so dnf will install these, too.

  Both ways struggle with refreshing data:
  * in 1) we might need to refresh coprs enabled (on the users' side)
  * in 2) we would need to re-create repodata in depended coprA if coprB

 I think that 3) is ok from this POV. The problem here can be, that in 3), dnf 
 would on update technically enable other copr repos without explicit user 
 approval. I'm not sure whether this is a problem or not, though.
Well, dnf/yum should show you what will be installed/enabled as dependencies, 
so the user is kind of informed what extra repos will be installed and enabled.

  gets changed (on the server's side).
 
  Let's discuss this a bit, I'm eager to hear your opinions.
 
  Cheers,
  Honza

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc. http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

planned bind-pkcs11 changes in F20+

2014-09-25 Thread Tomas Hozza
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello all.

I would like to inform everyone about changes I plan to do
in Fedora 20+ due to Bug 1097752 (Support for native PKCS#11
interface - needed by FreeIPA).

Currently there is a bind-pkcs11 package which includes
couple of utilities needed for working with PKCS#11.

- From the user feedback I got during the past year or so, utilities
from PKCS#11 didn't work much. I backported the native
PKCS#11 functionality from Bind 9.10 and plan to add/change
the following sub-packages:

bind-pkcs11
 - will contain special version of named (named-pkcs11) which
   is compiled with the native PKCS#11 and doesn't use OpenSSL,
   for crypto, but some HSM.

bind-pkcs11-libs
 - libdns and libisc compiled with native PKCS#11 functionality.
   These will be distributed as libdns-pkcs11 and libisc-pkcs11.

bind-pkcs11-devel
 - development files for the native PKCS#11 versions of libisc
   and libdns.

bind-pkcs11-utils
 - will provide utilities previously provided by the bind-pkcs11
   package. The update path will be solved as described in Packaging
   guidelines. These utilities are compiled with native PKCS#11, too.


If this changes could break someone's setup, please let me know
so we can work on some solution. Otherwise I'll do the changes
some day next week.

Thank you.

Regards,
- -- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUJBjZAAoJEMWIetUdnzwti44H/11yHgr1tpvPOYuyqrnP3+wl
UV5yiB5f8ygZdal9IclU7b9F/MrsB/lpsXVmyHHB3tPEF2ed9yTMyhNM3MrAV/pe
Fu8VygUqkiL3ZC1R5jVL/qLK590RO374oLD7UTaHfC1zfu1MnVf3G+2NwtSlXUP1
SAHTU5jCgBf3/9sqykPjuxZ4nwiImpAziMaMrzDzqTVGHmwgO7+W02HVo0wAD9dl
VJbdOL+HXIKQFIHyLDLJq+Zfn+qR06vG2L+aIPkAjkIsOM2ied9TtIuT+NQZQEs0
k0ccAL59Nr1aUtBDaNVWhf+AZ6cZBcWvKxYqooiRh2BaWs4JbWrm81PnIa/a4PU=
=2KjZ
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: planned bind-pkcs11 changes in F20+

2014-09-25 Thread Tomas Hozza
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 09/25/2014 05:18 PM, Paul Wouters wrote:
 On Thu, 25 Sep 2014, Tomas Hozza wrote:

  I would like to inform everyone about changes I plan to do
  in Fedora 20+ due to Bug 1097752 (Support for native PKCS#11
  interface - needed by FreeIPA).
 
  Currently there is a bind-pkcs11 package which includes
  couple of utilities needed for working with PKCS#11.
 
  - From the user feedback I got during the past year or so, utilities
  from PKCS#11 didn't work much. I backported the native
  PKCS#11 functionality from Bind 9.10 and plan to add/change
  the following sub-packages:

 Sounds good to me. The only people this would affect are those running
 bind with an hsm, and we'd hope they would be on rhel/centos to begin
 with. But even if this moves gradually into there, it looks good.

Good to hear that. I think Fedora is a great place for people wanting
to try it out. I don't expect someone to run it in production enterprise
environment on Fedora.

 I was hoping bind 9.10+ would be able to do runtime pkcs#11 hsm stuff :/
 without the need for hacking and recompiling.

Yeah, I was hoping for the same thing. Unfortunately it is not possible
even with BIND 9.10 (which will be in F22). Upstream is opened to patches,
but don't have time and interest to do it themselves.

- From my point of view the ideal situation would be if BIND could fall back
to using OpenSSL if there is no HSM configured (or working). Well, I might
look into it in the future, but it is a low priority item for me, too.

Unfortunately this adds yet another compiled version of named (there
is already named-sdb). However the positive thing is that this way it
will not change anything for current named users.

Thanks for your opinion.

Regards,
- -- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUJDRtAAoJEMWIetUdnzwtU/YIAMwMqdz7p2SUVvDXl46TfAb8
W+kyKxdyYLCyM5Am85bEN70FkLiMMaP1Y1VsGh3IpQr/j67/mX39iZSp8qyMsig0
Z0ooCV1TyupqnYzBzQoHjJE7zMHz/50MNhEkrrBHwel1iXa0As6H2Wiexn/enqQe
CkzMnR9fvVNs2kY/htx40MSqSXELegQk0W90XhrvXG7QUx4kcraPAAhJwRjkNezp
rrad1Xb19WUDkv2/990bppnkja6lN1I9efKyLDO7jIQ5JVYc4pNK4C6769uP95RO
K1WaIEh089XwmVa0JkdiGNRQTId1OtqsSNiKIodsMoBYeoukl85cMi3ldYYoYqk=
=N1i5
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: F22 Self Contained Change: BIND version 9.10

2014-09-16 Thread Tomas Hozza
On 09/16/2014 01:34 PM, Jaroslav Reznik wrote:
 = Proposed Self Contained Change: BIND version 9.10 = 
 https://fedoraproject.org/wiki/Changes/BIND_9.10
 
 Change owner(s): Tomas Hozza tho...@redhat.com
 
 BIND (Berkeley Internet Name Domain) version 9.10 is the latest stable major 
 update of the widely used DNS server. Besides new features, some settings 
 defaults have changed since the previous major version (9.9). 
 
 == Detailed Description ==
 
 FULL BIND 9.10 RELEASE NOTES [1]
 
 === New features ===
 * New zone file format, map, stores zone data in a format that can be 
 mapped 
 directly into memory, allowing significantly faster zone loading.
 * New tool delv (domain entity lookup and validation) with dig-like 
 semantics for looking up DNS data and performing internal DNSSEC validation 
 has been added.
 * New prefetch option improving the recursive resolver performance has been 
 added.
 * Improved EDNS processing allowing better resolver performance.
 * Substantial improvements have been made in response-policy zone (RPZ) 
 performance.
 * ACLs can now be specified based on geographic location using the MaxMind 
 GeoIP databases.
 * The statistics channel can now provide data in JSON format as well as XML.
 * The new in-view zone option allows zone data to be shared between views, 
 so that multiple views can serve the same zones authoritatively without 
 storing multiple copies in memory.
 * Native PKCS#11 API has been added. This allows BIND 9 cryptography 
 functions 
 to use the PKCS#11 API natively, so that BIND can drive a cryptographic 
 hardware service module (HSM) directly instead of using a modified OpenSSL as 
 an intermediary (Native PKCS#11 is known to work with the Thales nShield HSM 
 and with SoftHSM version 2 from the Open DNSSEC project.).
 * New tool named-rrchecker can be used to check the syntax of individual 
 resource records, and optionally to convert them to the format used for 
 unknown record types.
 * New tool dnssec-importkey allows offline DNSSEC keys (i.e., keys whose 
 private data is not stored on the system on which named is running) to be 
 published or deleted on schedule using automatic DNSKEY management.
 * Network interfaces are re-scanned automatically whenever they change.  Use 
 automatic-interface-scan no; to disable this feature.
 ** Added rndc scan to trigger an interface scan manually.
 * New max-zone-ttl option enforces maximum TTLs for zones. If loading a 
 zone 
 containing a higher TTL, the load fails. DDNS updates with higher TTLs are 
 accepted but the TTL is truncated.
 * Multiple DLZ databases can now be configured, and are searched in order to 
 find one that can answer an incoming query.
 * named-checkzone and named-compilezone can now read journal files.
 
 === Feature changes ===
 * The version 3 XML schema for the statistics channel, including new 
 statistics and a flattened XML tree for faster parsing, is no longer 
 optional. 
 The version 2 XML schema is now deprecated.
 * named now listens on IPv6 as well as IPv4 interfaces by default.
 * The internal and export versions of the BIND libraries (libisc, libdns, 
 etc) 
 have been unified so that external library clients can use the same libraries 
 as BIND itself.
 * The default setting for the -U option (setting the number of UDP listeners 
 per interface) has been adjusted to improve performance.
 * Adaptive mutex locks are now used on systems which support them.
 * rndc flushtree now flushes matching records from the address database and 
 bad cache as well as the DNS cache. (Previously only the DNS cache was 
 flushed.)
 * The isc_bitstring API is no longer used and has been removed from the 
 libisc 
 library.
 * The timestamps included in RRSIG records can now be read as integers 
 indicating the number of seconds since the UNIX epoch, in addition to being 
 read as formatted dates in MMDDHHMMSS format.
 
 == Scope ==
 * Proposal owners: Rebase the package to the latest 9.10 minor version and 
 resolve possible packaging issues. (Also rebuild all currently existing 
 dependent packages listed below)
 
 * Other developers: Rebuild dependent packages (dhcp, dnsperf, bind-dyndb-
 ldap) 
 ** Owner of this feature is co-maintainer of all dependent packages. He will 
 do the necessary rebuilds himself in cooperation with dependent packages 
 owners.
 
 * Release engineering: N/A (not a System Wide Change) 
 * Policies and guidelines: N/A (not a System Wide Change)
 
 [1] http://ftp.isc.org/isc/bind9/9.10.0-P2/RELEASE-NOTES-BIND-9.10.0-P2.txt
 ___
 devel-announce mailing list
 devel-annou...@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel-announce
 

You can try BIND 9.10.1b2 using COPR repo:
http://copr-fe.cloud.fedoraproject.org/coprs/thozza/bind-9.10.1b2/

I'll update the COPR in the mean time since there is already a RC1.

Dependent packages can be found here:
http://copr-fe.cloud.fedoraproject.org

Summary/Minutes from today's FESCo Meeting (2014-08-20)

2014-08-20 Thread Tomas Hozza
===
#fedora-meeting: FESCO (2014-08-20)
===


Meeting started by thozza at 17:04:28 UTC. The full logs are available
at
http://meetbot.fedoraproject.org/fedora-meeting/2014-08-20/fesco.2014-08-20-17.04.log.html
.



Meeting summary
---
* init process  (thozza, 17:04:48)

* #1178 Fedora 21 scheduling strategy  (thozza, 17:08:36)
  * AGREED: Go into freeze the day after we have a usable TC. revisit
schedule next meeting to see if we need to adjust/delay/change
anything. (+6)  (thozza, 17:24:56)
  * ACTION: dgilmore will send the heads-up on devel list once we have
TC (day before freeze)  (thozza, 17:25:24)

* #1322 F21 Changes - Progress on Changes Freeze  (thozza, 17:25:43)
  * ACTION: thozza will update the ticket asking for update on Changes
progress  (thozza, 17:28:58)

* #1330 F22 System Wide Change: Perl 5.20 -
  https://fedoraproject.org/wiki/Changes/perl5.20  (thozza, 17:29:12)
  * AGREED: F22 System Wide Change: Perl 5.20 has been approved (+6)
(thozza, 17:34:42)

* #1331 The package pipelight violates Fedora guidelines regarding
  (thozza, 17:34:56)
  * ACTION: sgallagh to discuss proper review policy with the approver.
(sgallagh, 17:38:46)

* #1332 F22 retire orphan packags after 4 weeks instead of once per
  release  (thozza, 17:53:22)
  * ACTION: sgallagh to talk to maintainer as well (previous topic)
(sgallagh, 17:53:45)
  * ACTION: thozza ask reporter to move the discussion to the devel list
(thozza, 18:04:37)

* #1333 OpenJDK maintainer refuses to address F20-F21 upgrade bug once
  per release  (thozza, 18:04:48)
  * LINK:

https://fedoraproject.org/wiki/Upgrading_Fedora_using_yum#To_Fedora_21_pre-release
should work  (kalev, 18:14:57)
  * AGREED: Ask jvanek to make f20-f21 upgrades result in a working
system, reasonably similar to a clean f21 install. FESCo declares BZ
1130247 to be a blocker for F21 Beta. (+6)  (thozza, 18:19:57)

* Next week's chair  (thozza, 18:20:34)
  * nirik to chair next week’s meeting  (thozza, 18:23:56)

* Open Floor  (thozza, 18:24:11)

Meeting ended at 18:32:41 UTC.




Action Items

* dgilmore will send the heads-up on devel list once we have TC (day
  before freeze)
* thozza will update the ticket asking for update on Changes progress
* sgallagh to discuss proper review policy with the approver.
* sgallagh to talk to maintainer as well (previous topic)
* thozza ask reporter to move the discussion to the devel list




Action Items, by person
---
* dgilmore
  * dgilmore will send the heads-up on devel list once we have TC (day
before freeze)
* sgallagh
  * sgallagh to discuss proper review policy with the approver.
  * sgallagh to talk to maintainer as well (previous topic)
* thozza
  * thozza will update the ticket asking for update on Changes progress
  * thozza ask reporter to move the discussion to the devel list
* **UNASSIGNED**
  * (none)




People Present (lines said)
---
* thozza (59)
* nirik (47)
* sgallagh (45)
* jvanek (32)
* mitr (28)
* kalev (27)
* jwb (10)
* dgilmore (7)
* zodbot (5)
* mmaslano (0)
* mattdm (0)
* t8m (0)




Generated by `MeetBot`_ 0.1.4

.. _`MeetBot`: http://wiki.debian.org/MeetBot
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Schedule for Wednesday's FESCo Meeting (2014-08-20)

2014-08-19 Thread Tomas Hozza
Following is the list of topics that will be discussed in the FESCo
meeting Wednesday at 17:00UTC in #fedora-meeting on irc.freenode.net.

To convert UTC to your local time, take a look at
  http://fedoraproject.org/wiki/UTCHowto

or run:
  date -d '-MM-DD 17:00 UTC'


Links to all tickets below can be found at:
https://fedorahosted.org/fesco/report/9

= Followups =

#topic #1178 Fedora 21 scheduling strategy
.fesco 1178
https://fedorahosted.org/fesco/ticket/1178

#topic #1322 F21 Changes - Progress on Changes Freeze
.fesco 1322
https://fedorahosted.org/fesco/ticket/1322

= New business =

#topic #1330 F22 System Wide Change: Perl 5.20 -
https://fedoraproject.org/wiki/Changes/perl5.20
.fesco 1330
https://fedorahosted.org/fesco/ticket/1330

#topic #1331 The package pipelight violates Fedora guidelines regarding
downloading of 3rd party software
.fesco 1331
https://fedorahosted.org/fesco/ticket/1331

#topic #1332 F22 retire orphan packags after 4 weeks instead of once per
release
.fesco 1332
https://fedorahosted.org/fesco/ticket/1332

= Open Floor =

For more complete details, please visit each individual ticket.  The
report of the agenda items can be found at
https://fedorahosted.org/fesco/report/9

If you would like to add something to this agenda, you can reply to
this e-mail, file a new ticket at https://fedorahosted.org/fesco,
e-mail me directly, or bring it up at the end of the meeting, during
the open floor topic. Note that added topics may be deferred until
the following meeting.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Schedule for Wednesday's FESCo Meeting (2014-08-20)

2014-08-19 Thread Tomas Hozza
On Tue 19 Aug 2014 01:40:55 PM CEST, Stephen Gallagher wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 08/19/2014 04:14 AM, Tomas Hozza wrote:
 Following is the list of topics that will be discussed in the
 FESCo meeting Wednesday at 17:00UTC in #fedora-meeting on
 irc.freenode.net.

 To convert UTC to your local time, take a look at
 http://fedoraproject.org/wiki/UTCHowto

 or run: date -d '-MM-DD 17:00 UTC'


 Links to all tickets below can be found at:
 https://fedorahosted.org/fesco/report/9

 = Followups =

 #topic #1178 Fedora 21 scheduling strategy .fesco 1178
 https://fedorahosted.org/fesco/ticket/1178

 #topic #1322 F21 Changes - Progress on Changes Freeze .fesco 1322
 https://fedorahosted.org/fesco/ticket/1322

 = New business =

 #topic #1330 F22 System Wide Change: Perl 5.20 -
 https://fedoraproject.org/wiki/Changes/perl5.20 .fesco 1330
 https://fedorahosted.org/fesco/ticket/1330

 #topic #1331 The package pipelight violates Fedora guidelines
 regarding downloading of 3rd party software .fesco 1331
 https://fedorahosted.org/fesco/ticket/1331

 #topic #1332 F22 retire orphan packags after 4 weeks instead of
 once per release .fesco 1332
 https://fedorahosted.org/fesco/ticket/1332


#topic #1333 OpenJDK maintainer refuses to address F20-F21 upgrade bug
once per release .fesco 1333
https://fedorahosted.org/fesco/ticket/1333

 = Open Floor =

 For more complete details, please visit each individual ticket.
 The report of the agenda items can be found at
 https://fedorahosted.org/fesco/report/9

 If you would like to add something to this agenda, you can reply
 to this e-mail, file a new ticket at
 https://fedorahosted.org/fesco, e-mail me directly, or bring it up
 at the end of the meeting, during the open floor topic. Note that
 added topics may be deferred until the following meeting.


 I opened https://fedorahosted.org/fesco/ticket/1333 this morning; can
 we get that onto the agenda for tomorrow as well, please?

Sure, I added the ticket to the New Business section.

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1

 iEYEARECAAYFAlPzN8cACgkQeiVVYja6o6O8mQCfZBFfxus/PDueLVLi3jXZ668+
 xmEAn0f1SGeKarhEsBswcGixV6c8G9ow
 =qoqR
 -END PGP SIGNATURE-

Regards,
Tomas
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

BIND 9.10.1 beta with seccomp functionality

2014-08-19 Thread Tomas Hozza
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello.

ISC is working on new BIND 9.10 release which includes the seccomp
functionality. It can be turned on by configuring BIND before build with
--enable-seccomp.

ISC asked me to kindly ask Fedora community if they would be willing to
test it. Currently I'm working on rebasing BIND to 9.10 in rawhide.
However it is still not finished. Since DHCP (including dhclient)
depends on BIND libraries I'm not able to easily provide a testing RPMs
that would be installable.

In the future I would like to turn the feature on by default.

So if you are willing to test the feature, you can download latest BIND
9.10.1b2 on http://www.isc.org/downloads/

Configure it with --enable-seccomp and you're good to go.

You can send your feedback to bind-beta-respo...@lists.isc.org,
bind-us...@lists.isc.org or bind-b...@isc.org

Some words about the feature from the contributor:
It goes further than a chroot. chroot limits an attacker to a
filesystem. it doesn't prevent the attacker from running his exploit
aka nefarious code and making socket connections over the internet that
would give him some kind of backdoor access where he can remotely
execute his code.

That's where seccomp kicks in, it acts as a 2nd wall of defence. In case
of a security hole being present in the server process, it goes further
than a chroot, it prevents the attacker from making socket connections
orexecuting his code, as his playing field is significantly reduced.
There's very little he can do.”

Thank you.

Regards,
- -- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJT82i/AAoJEMWIetUdnzwtooYH/1hffLhpDtY1zTPNVtSlFLUx
236mJQGZMS5jsHAKPtd354qLCSMSIBTEeeGPCUkV9YC3ZtrF+wT6FCN1XFgDylpr
7S2toCAVOpjbPIUIOJZ8HvRZENb//KGxUHg8GrlIfHZMeXB9EXhvaTcxLC1QTX04
JSZyQKXIaDWurTGM/AQESAwHkIWK1vaubmrI2dt8L0mp9e5RWc3N/sb5XAup0jfa
zfkP/oPsmeS6mZvKdoc/BiwDDj8bLm8NBLHFO++tES0e43HnWAo9+H4HqSNuX5JQ
0q4a11zy55VtL8G99kzGN64gdvtXbiNDVuxulecWxxK9BUncHv3aXu5t4ggO0yg=
=MtKc
-END PGP SIGNATURE-
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: BIND 9.10.1 beta with seccomp functionality

2014-08-19 Thread Tomas Hozza
On Tue 19 Aug 2014 05:12:31 PM CEST, Chris Adams wrote:
 Once upon a time, Tomas Hozza tho...@redhat.com said:
 That's where seccomp kicks in, it acts as a 2nd wall of defence. In case
 of a security hole being present in the server process, it goes further
 than a chroot, it prevents the attacker from making socket connections
 orexecuting his code, as his playing field is significantly reduced.
 There's very little he can do.”

 How is that different from an SELinux policy?  How is the additional
 resitrction handled (if it isn't SELinux, what mechanism is used to do
 the restriction)?

I'm not such expert in this field to answer your question. However by 
googling you can find some information about seccomp:
https://wiki.mozilla.org/Security/Sandbox/Seccomp
http://outflux.net/teach-seccomp/

However I would love to see some opinion and response from someone 
working on SELinux and security.

Regards,
--
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Retiring bind10 in F21+

2014-08-18 Thread Tomas Hozza
Hi.

BIND10 project developed by ISC ended earlier this year [1]. Therefore
as of today I'm retiring the bind10 package from Fedora 21+. The DHCP
servers part is already submitted for package review in Fedora [2].

[1]
http://www.isc.org/blogs/isc-concludes-bind-10-development-with-release-1-2-project-renamed-bundy/
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1130617

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Non-responsive maintainer: Deji Akingunola (fas: deji)

2014-07-28 Thread Tomas Hozza
- Original Message -
 From: Kevin Fenzi ke...@scrye.com
 To: devel@lists.fedoraproject.org
 Sent: Saturday, July 26, 2014 7:17:24 PM
 Subject: Re: Non-responsive maintainer: Deji Akingunola (fas: deji)
 
 On Fri, 27 Jun 2014 09:01:33 -0600
 Kevin Fenzi ke...@scrye.com wrote:
 
  On Fri, 27 Jun 2014 22:03:30 +0800
  Christopher Meng cicku...@gmail.com wrote:
  
   My opinion is, you should only comaintain what you want, not take
   over other's packages.
   
   If FESCo member could give consent of adding someone as an admin(not
   the point of the contact) of a package instead of orphaning lots of
   packages, that will be helpful.
  
  The plan is to orphan the packages, but leave the old point of contact
  with acls. That way someone active can take over the package, but if
  the old point of contact comes back they can just join right back in.
  
  This way the package gets active folks caring for it and the former
  point of contact can come back anytime.
 
 Sorry for the long delay here. ;( There was a issue with the pkgdb2 api
 to do this, then I was traveling, etc.
 
 It's now been done.
 
 The following packages are looking for a new point of contact on at
 least one branch:
 
 (Note that many of them have co-maintainers, so do check with them to
 see if any of them would like to become the new point of contact):
 
 atlas
Taken by fkluknav

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: Attempting to contact unresponsive maintainer - jkoncick

2014-07-07 Thread Tomas Hozza
- Original Message -
 Greetings, we've been told that the email addresses
 for this package maintainer is no longer valid.  I'm starting the
 unresponsive maintainer policy to find out if they are still interested
 in maintaining their packages (and if so, have them update their email
 addresses in FAS).  If they're not interested in maintaining or we
 can't locate them I'll have FESCo orphan the packages so that others
 can take them over.
 
 If you have a way to contact this maintainer, please let them
 know that we'd appreciate knowing what to do with their packages.
 Thanks!
 
 * jkoncick - former email address: jkonc...@redhat.com
   https://admin.fedoraproject.org/pkgdb/packager/jkoncick
 
 If we don't hear anything in a week, we will be removing their acls and
 will need to find new point of contacts, etc.
 
 Thanks,
 
 kevin

Hi Jaromir was an intern at Red Hat and finished today.
I think it is OK if you remove his acls right away.

Regards,
-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

FESCo candidature announcement

2014-07-04 Thread Tomas Hozza
Hi all.

I would like to announce my candidature for FESCo member. Besides goals I'm
interested [1] in I would like to stress, that I'm prepared to fight for 
changes,
that would be beneficial for Fedora users and developers.

I don't want to make decisions on any topic without prior research and proper
understanding. I think all important changes should be thoroughly discussed
and not made silently.

Have you any questions, feel free to ping me on IRC (#fedora-devel) or
drop an email.

Tomas

[1] 
https://fedoraproject.org/wiki/Development/SteeringCommittee/Nominations#Candidates

-- 
Tomas Hozza
Software Engineer - EMEA ENG Developer Experience

PGP: 1D9F3C2D
Red Hat Inc.   http://cz.redhat.com
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Split of bind-chroot package in Fedora rawhide branch

2013-12-18 Thread Tomas Hozza
Hi.

I would like to prevent unpleasant surprises and announce,
that bind-chroot sub-package of bind has been split into
two sub-packages in the Fedora rawhide branch.

Previously the bind-chroot sub-package contained named-chroot.service
enabling users to run named in a chroot environment and also
named-sdb-chroot.service enabling users to run named-sdb
in a chroot environment.

From now on, there are two subpackages:
- 'bind-chroot' - for running named in a chroot (nothing changes)
- 'bind-sdb-chroot' - for running named-sdb in a chroot

User that want to run named-sdb in a chroot must install
the 'bind-sdb-chroot' package explicitly. This change is a part
of fixing Bug #997030. The package will be also NOT
installed if updating to Fedora rawhide, because it cannot
be currently done (AFAIK) without creating unwanted dependencies.

As an addition named-sdb now uses its own chroot path 
'/var/named/chroot_sdb'.

Regards,

Tomas Hozza
___
devel-announce mailing list
devel-annou...@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Re: PSA: If you are C/C++ developer, use cppcheck

2013-12-17 Thread Tomas Hozza
- Original Message -
 Hi
 
 
 On Tue, Dec 17, 2013 at 12:47 PM, Daniel P. Berrange wrote:
 
 
 The issues reported against libvirt all appear to be false positives.
 Not entirely surprising since we already have coverity run against
 libvirt code nightly.
 
 Thanks for the quick response. Does Red Hat run it only for packages in RHEL
 or it is run against all Fedora packages? If not, would it be possible for
 Red Hat to do so and publish the results on a regular basis? That might be a
 useful service.

We run the scans also on Fedora packages regularly. However I'm not sure if also
for fedora packages that doesn't have Red Hat maintainers. Any Red Hat Engineer
has the Coverity tool available to use and can scan any open-source project
with it. I personally scanned some network daemons like BIND, ISC DHCP, dnsmasq,
unbound, Squid, and also couple of other projects and sent a ton of patches
to upstream projects. Now I'm doing only scans for possible added issues,
when there is a new version.

Publishing scan results for all Fedora packages might not be very good idea,
since the static analysis can find issues with possible security impact.

Also Coverity offers their tool to open-source projects for free [1]. I think
some projects are already using it (at least Squid). So if upstream projects
are interested, they can sign up for free.

[1] https://scan.coverity.com/

Regards,

Tomas Hozza
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Unresponsive maintainers of dependent packages

2013-12-09 Thread Tomas Hozza
Hi.

Before my question, little bit of introduction:
---
I'm the maintainer of 'openobex' package (library) which
was rebased to the latest version in rawhide on the
end of September this year. The rebase was announced
2 weeks in advance on fedora-devel and I also CC-ed
all maintainers of dependent packages about the change.

There was an API change, so more work than just rebuilding
dependent packages is needed.

I emailed maintainers of dependent packages and also created
Bug [1] for each component, to track those rebuilds.

So far some dependent packages has been deprecated, but there
are still three that have broken dependencies and their
maintainers seem to not care.

Question:
-
The main problem for me is that the buildsystem (koji) emails
me every day and for every dependent package that their dependencies
are broken. Can I ask these packages to be deprecated in rawhide,
or what can I do with them? I don't want to take maintenance
of those packages.


Dependent packages I have problem with are:
- obexfs
- obexftp
- libopensync-plugin-irmc

Thanks in advance for any help/opinion.

Regards,

Tomas Hozza

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1014160
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Heads up - updating openobex in rawhide to 1.7.1 - API change

2013-09-11 Thread Tomas Hozza
Hi.

I'm going to update the openobex package in rawhide
to the latest version (1.7.1) in about two weeks.
Unfortunately this version breaks the API, so dependent
packages need to be patched in order to be build.
Needed changes should be small.

Since the rebase is from version 1.5 - 1.7.1 following
changes are relevant:

Upgrade guide from previous version of openobex
===
Upgrading to version 1.7

When using an event loop that triggers on incoming data, you must call
OBEX_HandleInput() after each call to OBEX_Request() to actually send the
request.

Upgrading to version 1.6

The function OBEX_UnicodeToAscii() and its counterpart OBEX_AsciiToUnicode()
are gone. Please use the more complete functionality from your toolkit.
(For example libunistring - 
http://www.gnu.org/software/libunistring/manual/libunistring.html#uniconv_002eh)

If you use one of the functions InOBEX_ServerRegister() and
InOBEX_TransportConnect(), please change to TcpOBEX_ServerRegister() and
TcpOBEX_TransportConnect().

The functions OBEX_GetCustomData() and OBEX_SetCustomData() will really only
work with OBEX_TRANS_CUSTOM. Also, obex_t and obex_object_t changed the
declared type. If you pass it around, make sure to use them as pointer.

To use the bluetooth function, include the bluetooth headers of your system
before including openobex/obex.h or define bt_addr_t to the proper type.

The function OBEX_FindInterfaces is replaced by the functions
OBEX_EnumerateInterfaces() and OBEX_GetInterfaceByIndex().


The new version of openobex package can be found here:
http://koji.fedoraproject.org/koji/taskinfo?taskID=5918748
or
http://thozza.fedorapeople.org/openobex-1.7.1-repo/


Dependent packages are:
ircp-tray-0:0.7.6-3.fc20 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_ircp-tray/
libbtctl-0:0.11.1-14.fc20 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_libbtctl/
libopensync-plugin-irmc-1:0.22-7.fc20 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_libopensync-plugin-irmc/
obex-data-server-1:0.4.6-6.fc20 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_obex-data-server/
obexfs-0:0.12-7.fc20 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_obexfs/
obexftp-0:0.23-15.fc20.x86_64 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_obexftp/
syncevolution-1:1.3.99.3-6.fc20.x86_64 - 
http://thozza.fedorapeople.org/openobex-1.7.1-rebuilds_results/results_syncevolution/


If someone thinks we should not rebase openobex to the latest version
and has a good reason for it, feel free to replay to this email.

Thanks!


Regards,

Tomas Hozza
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct